7.50, expects payload on 9020/tcp. Applied patches: mmap, mprotect, syscall everywhere, kexec, delayed panics. Note: there is no Mira/HEN for 7.50 yet!
Finally a fast and stable WebKit exploit for PS4 System Software versions 6.00 to 9.60. Credits to Sergei Glazunov and
@maddiestone
for discovering vulnerability, anonymous for writing PsFree exploit and to myself for testing, porting and improvements. Showcase on PS4 9.00:
Some valid 7.02 addresses:
0x200eb00d8
0x200f300d8
0x200fb00d8
0x2011100d8
The success rate is about 10% for the last one. Unfortunately the exploit then crashes in the critical section in leakJSC. Will now investigate how to fix it.
I recommend anyone to use the Night King host (SALT), he is a faker in the ps4 scene, risk of brick on consoles, he is making money from the work of others. โโโโ
@ps4_hacking
@Znullptr
Very stable, ChendoChap wrote an excellent exploit here, it's near the stability of 5.05. It takes a bit more effort than previous exploits to do but it's not a big problem since it's so stable.
The conclusion of today!
The new JB for FW 9.00 is awesome!, very stable.
There was an issue in GoldHen, however it was resolved within no time.
I have tested 10 fpkgs and all of them worked flawlessly, except those who are built for specific fws e.g.
@Lapy05575948
PS4 Explorer
I ask for help for all my followers, make a donation to our developer friend to continue with his investigations on the PS4/PS5 console, any amount will help a lot for the future of the scene, thank you very much. ๐๐ป๐๐ป๐๐ป
@notzecoxao
It's lmiller47
@hotmail
.com
If people donate to get the hardware I'll still test it out...
I just feel like I'm getting burnt out both ends spending my own $ and losing more with all the time spend that I could be working.