Skip to content

Davi5Alexander/docker_pppwn

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Logo

PPPwn in Docker

This repository contains Docker files to run PPPwn, developed by TheOfficialFloW, easily using an Alpine image. It's ideal for running on a Raspberry Pi with a dedicated USB to Ethernet port for the PS4. PPPwn is a kernel remote code execution exploit for PlayStation 4 up to FW 11.00. It's a proof-of-concept exploit for CVE-2006-4304 that was responsibly reported to PlayStation. I was inspired by PI-Pwn.

Requirements

  • PS4 with 9.00, 10.00 or 11.00 firmware.
  • Docker installed on your system.
  • Ethernet cable.
  • USB with GoldHen (only for the first time).

Usage

  1. Clone the repository.
  2. Edit docker-compose.yml and change the values of FIRMWAREVERSION (900, 1000, or 1100) and INTERFACE (eth0, eth1, etc).
  3. Run docker-compose up -d.
  4. Check the logs, stop the script, start it, and restart it using port 8066 on your server, for example, http://192.168.1.2:8066 (you can change it in pppwn/web/nginx/default.conf).
  5. Turn on the PS4.

On your PS4 (first time):

  1. Insert the USB with goldhen.bin into the PS4.
  2. Go to Settings and then to Network.
  3. Select Set Up Internet Connection and choose Use a LAN Cable.
  4. Choose Custom Setup and select PPPoE for IP Address Settings.
  5. Enter anything for PPPoE User ID and PPPoE Password.
  6. Choose Automatic for DNS Settings and MTU Settings.
  7. Choose Do Not Use for Proxy Server.

Demo

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published