Navigation X
ALERT
Click here to register with a few steps and explore all our cool stuff we have to offer!



   573

EXPLOIT PS5 ON 03/10/2022

by HideakiAtsuyo - 04 October, 2022 - 02:53 AM
This post is by a banned member (HideakiAtsuyo) - Unhide
410
Posts
129
Threads
5 Years of service
#1
PS5 4.03 Kernel Exploit

What is it ?
Show ContentSpoiler:

Download:
Show ContentSpoiler:


Included:
  • Obtains arbitrary read/write and can run a basic RPC server for reads/writes (or a dump server for large reads) (must edit your own address/port into the exploit file on lines 673-677)
  • Enables debug settings menu (note: you will have to fully exit settings and go back in to see it).
  • Gets root privileges
Limitations:
  • This exploit achieves read/write, but not code execution. This is because we cannot currently dump kernel code for gadgets, as kernel .text pages are marked as eXecute Only Memory (XOM). Attempting to read kernel .text pointers will panic!
  • As per the above + the hypervisor (HV) enforcing kernel write protection, this exploit also cannot install any patches or hooks into kernel space, which means no homebrew-related code for the time being.
  • Clang-based fine-grained Control Flow Integrity (CFI) is present and enforced.
  • Supervisor Mode Access Prevention/Execution (SMAP/SMEP) cannot be disabled, due to the HV.
  • The write primitive is somewhat constrained, as bytes 0x10-0x14 must be zero (or a valid network interface).
  • The exploit's stability is currently poor. More on this below.
  • On successful run, exit the browser with circle button, PS button panics for a currently unknown reason.
LIKE/REP don't be a LEECHER!
Developer & Reverse Engineer
 Internal Hyper Links:
COBALT STRIKE 4.7 | Development Services | DEVELOPMENT, CRACKING, TUTORIALS, MORE..
DON'T HAVE A CRACKED.IO ACCOUNT ? CLICK HERE !
This post is by a banned member (COLTONM01) - Unhide
This post is by a banned member (Lolly77) - Unhide
This post is by a banned member (Yuroo) - Unhide
Yuroo  
Registered
5
Posts
0
Threads
3 Years of service
#4
(04 October, 2022 - 02:53 AM)HideakiAtsuyo Wrote: Show More
PS5 4.03 Kernel Exploit

What is it ?
Show ContentSpoiler:


Included:
  • Obtains arbitrary read/write and can run a basic RPC server for reads/writes (or a dump server for large reads) (must edit your own address/port into the exploit file on lines 673-677)
  • Enables debug settings menu (note: you will have to fully exit settings and go back in to see it).
  • Gets root privileges
Limitations:
  • This exploit achieves read/write, but not code execution. This is because we cannot currently dump kernel code for gadgets, as kernel .text pages are marked as eXecute Only Memory (XOM). Attempting to read kernel .text pointers will panic!
  • As per the above + the hypervisor (HV) enforcing kernel write protection, this exploit also cannot install any patches or hooks into kernel space, which means no homebrew-related code for the time being.
  • Clang-based fine-grained Control Flow Integrity (CFI) is present and enforced.
  • Supervisor Mode Access Prevention/Execution (SMAP/SMEP) cannot be disabled, due to the HV.
  • The write primitive is somewhat constrained, as bytes 0x10-0x14 must be zero (or a valid network interface).
  • The exploit's stability is currently poor. More on this below.
  • On successful run, exit the browser with circle button, PS button panics for a currently unknown reason.

Thanks! <3 Smart

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Forum Jump:


Users browsing this thread: 1 Guest(s)