PS4 Firmware Hack: How to Restore Your PS4 to OFW if You Want to Go Online
- snydersabrina1988
- Aug 20, 2023
- 7 min read
PS4 Jailbreak: Official tools and news for PS4 Jailbreak, latest updates directly from the PS4 hacking scene. You just got yourself a new PS4, and are looking for a PS4 Jailbreak / PS4 Custom Firmware solution? Then bookmark this page, as it will be kept up to date with the latest, greatest, and simplest solutions available for Playstation 4 CFW.
If you own a PS4 Running firmware 5.07 or below, congratulations, you are on the golden firmware to Jailbreak your PS4! The 5.05 PS4 Jailbreak was released in May 2018 (and to the best of our knowledge, it is compatible with the rare 5.07 firmware). See links below for details. Also in general you can apply the tutorials used for 4.55 below (just make sure you use the latest version of the tools).
Ps4 Firmware Hack
If you own a PS4 Running firmware 4.55 or below, you can jailbreak your console, although at the moment we suggest you update to a better supported firmware (see above). But here are some links related to the 4.55 jailbreak for reference:
Firmware 4.05 was hacked shortly before firmware 4.55. If you have a console running on firmware 4.05, we now recommend that you upgrade to get the latest hack (see above for links on how to run recent exploits and other tools). The links below are kept for reference:
In December 2015, Fail0verflow showed at the CCC hacking convention that they have Linux running on the PS4. They later on released all the required source code to run Linux on PS4, but not the required PS4 Jailbreak. Hacks have now been released for some models of PS4 to run Linux. Fail0verflow demonstrated Linux running on PS4 again, on Firmware 4.0x at the end of 2016.
Careful examination of the Fail0verflow 2015 presentation showed that the Fail0verflow crew were running their exploits through the Webkit 1.76 exploit, meaning their console was running on Firmware 1.76 at the time. in the 2016 Presentation, Fail0verflow member Marcan confirmed his PS4 was running on firmware 4.05.
In December 2015, hacker CTurt confirmed he has a PS4 jailbreak. He later revealed a second exploit. Both exploits have been released, in particular the dlclose exploit has been releasesd on PS4 firmware 1.76 and below, and is fully functional.
Although there is real progress being made on PS4 Jailbreaks and hacks, several sites exist with the goal of tricking you, pretending they have a PS4 Jailbreak for you. We debunk a few of those below, as always, beware of bad sites. When a PS4 Jailbreak is made available for your PS4, popular scene sites such as us at wololo.net will be the firsts to let you know.
More generally, ask yourself about the odds that you are the first one in the world to find about a PS4 hack that nobody else knows about. Console hacking is our passion on this site, and we have dozens of community members scouting the internet for any verifiable piece of information. If something like that was legit, we would find out within hours. Again, when a PS4 jailbreak/Custom Firmware is made available, wololo.net and other reputable scene websites will be the first ones to let you know.
To summarize, as far as a full Jailbreak is concerned, nothing concrete has been announced or even rumored recently for firmwares 9.03 and above. 9.03 and 9.04 are vulnerable to the BD-jB usermode exploit, though.
While most hackers have their eyes on Webkit vulnerabilities, the Google Project Zero team have disclosed vulnerabilities in the libxml2 library. That library is used by the PS4, and the disclosure is fresh enough that all firmwares up to 10.01 could be impacted. But tests remain to be done on that front, and it would be, again, usermode only.
The aforementioned hack/exploit now allows for a PlayStation 4 console to be fully jailbroken, roughly eight years after the system was first revealed. As a result, almost anybody can now run homebrew applications and even pirated games on their last-gen Sony consoles.
TheFlow (Andy Nguyen in real life) is well-known in the PlayStation community as a "hacking god," having posted multiple hacks on GitHub that covered several earlier firmware versions for the last-gen console.
But first, let it be known that we at Tech Times do not condone the use of homebrew software and other hacks-including pirated video games-on your PS4 or any console.So use this exploit at your own risk.
It used to be tough to jailbreak a PlayStation console due to Sony's efforts of making the systems secure. To break through, a physical modification will have to be done. But for this hack, Fail0verflow says they only had to tinker with the software.
Given that the PS4 has now been fully hacked, there is a good possibility that its newer, more powerful successor might come soon. Sony will also inevitably catch wind of this news and move forward to secure their current-gen system from hackers even further.
Hackers attending the GeekPwn conference in Shanghai have revealed a new exploit for PlayStation 4 running on the 4.01 firmware. In a live demo you can see below, once again the Webkit browser is utilised in order to inject the exploit, which - after a conspicuous cut in the edit - jumps to a command line prompt, after which Linux is booted. NES emulation hilarity courtesy of Super Mario Bros duly follows.
Assuming the hack is authentic - and showcasing it at GeekPwn makes the odds here likely - it's the first time we've seen the PlayStation 4's system software security compromised since previous holes in the older 1.76 firmware came to light, utilised by noted hacker group fail0verflow in the first PS4 Linux demo, shown in January this year.
The hack is also significant in that firmware 4.01 - or a prior version - is likely to be installed on the upcoming PlayStation 4 Pro, and the close compatibility and identical operating system used by the new hardware also makes that vulnerable to the same exploits. What is troubling about these Webkit exploits that periodically appear for PS4 is that they are granting full kernel access to the hardware, required in order to run Linux.
A PlayStation 4 port of Linux has been publicly available for ten months now, but its usefulness to owners of the console has been limited since Sony has done a pretty good job of closing up exploits as soon as they are discovered and older consoles with vulnerable firmware updates are rare to the point of non-existence. That's a good thing in one respect, as piracy would inevitably follow at some point. However, running a full desktop OS on the console could be rather interesting.
In terms of a release for the 4.01 exploit, we wouldn't hold our breath there. The group behind the video - Chaitin.cn - appears to be a legitimate Beijing-based company that specialises in internet security, and that may explain the sudden release of firmware 4.05 for PlayStation 4 in the wake of the group's demo at GeekPwn earlier this week.
It was just last week when hackers identified a way to exploit PlayStation 4 (PS4) Firmware 4.05 or 4.55 for running Linux via the PS4 Linux Loader payload tool. In this particular technique, hackers leveraged IDC kernel exploit. At that time, the exploit was compatible with selected systems that run firmware 4.55 and support FAT filesystem.
However, as per latest reports, a hacker using the alias qwertyoruiop has used the same technique to run Linux on PS4 Firmware 5.50. It must be noted that Sony had already patched the exploit from the kernel of PS4 Firmware 5.50 but seems like qwertyoruiop has rewritten the public WebKit exploit so that the systems that have been updated could run firmware 5.50.
Though we are not at all encouraging use of pirated software at any device let alone on such a prestigious console like PS4, if you do want to try out the public WebKit from qwertyoruiop then open crack.bargains/550/ on your PS4 running firmware 5.50. The link will open in the built-in web browser of PS4.
It is obvious that Sony will soon be releasing a new firmware to patch the latest exploits. Meanwhile, to run Linux on PS4, you can stick to using the 4.55 firmware as well as PS4 Payload Sender tools for hacking the console and run a GNU/Linux distribution.
Since there haven't been any major public announcements regarding PS4 hacking for a long time now, I wanted to explain a bit about how far PS4 hacking has come, and what is preventing further progression.
You may download my complete setup here to run these tests yourself; it is currently for firmware 1.76 only. If you are on an older firmware and wish to update to 1.76, you may download the 1.76 PUP file and update via USB.
In 2014 nas and Proxima announced that they had successfully been able to port an exploit using this vulnerability, originally written for Mac OS X Safari, to the PS4's internet browser, and released the PoC code publicly as the first entry point into hacking the PS4.
Since then, many other vulnerabilities have been found in WebKit, which could probably be used as an entry point for later firmwares of the PS4, but as of writing, no one has ported any of these exploits to the PS4 publicly.
It has been reported to me that very old firmwares (1.05) don't have ASLR enabled, but it was introduced sometime before firmware 1.70. Note that kernel ASLR is not enabled (for firmwares 1.76 and lower at least), which will be proved later in the article.
Recently Jaicrab has discovered two UART ports on the PS4 which shows us that there are hardware hackers interested in the PS4. Although the role of hardware hackers has traditionally been to dump the RAM of a system, like with the DSi, which we can already do thanks to the WebKit exploit, there's also the possibility of a hardware triggered kernel vulnerability being found, like geohot's original PS3 hypervisor hack. It remains most likely that a kernel exploit will be found on the PS4 through system call vulnerabilities though.
PS4 firmware security is usually strict enough that it is cracked after a long time, and those who have a homebrew PS4 were on an older version of the firmware for a long time. This has changed now with the release of the PS4 9.00 firmware jailbreak. 2ff7e9595c
Comentarios