Main menu

Pages

PS5 4.03 Kernel Exploit Released!



Welcome to this PS5 News and updates So we finally now have a kernel exploit implementation for the PlayStation 5 that you can run right now on your PS Five console, and this one came out of left field a little a bit.
Originally, we were thinking we were going to get an implementation with the BDJ exploit chained with this kernel exploit in order to be able to access the exploit on the PS Five, and Sleirsgoevy's is still working on that.
However, Specter came out of left field here and gave us an implementation that uses a Web Kit exploit to trigger the Colonel exploit instead. And so, because of that, this will only work up to 4.03 because the web kit exploit was patched after 4.03
So it's still worthwhile for people on higher firmware's to wait for Sleirsgoevy's  implementation with the BDJ exploits because it wasn't patched until 5.00, which means his implementation should work on 4.54.51 firmware's, whereas Specter's implementation here, because it uses the Web Kit, is only going to work up to 4.03. 
However, if you have a digital edition console, then this is great news for you, because you can take advantage of this 4.3 exploit providing you have a PS Five that's on 4.03 or lower. So that's what we've got here so far. 
So obviously the exploit is quite unstable at the moment. The Web Kit seems to be fairly stable, but the kernel exploits a bit unstable, so it's quite common to get crashes when trying to load the exploits, and you'll just have to reboot the PS Five and try again. 
So don't worry about that, that's normal. If you want to test the exploit yourself, you can absolutely do so. All you need to do is go into your network settings on your PS Five, make sure you've updated to 4.03, of course, and what you want to do is head into the network settings, change your network settings and change the DNS address to: 
165.227.83.145
Once you have this DNS address added in your network settings, you can then log out and log back into your profile to clear your website data, which is weird, but that's what you have to do on the PS Five, otherwise it doesn't clear properly. 
And then go onto the user Guides, accept the security certificate and it will take you to Alison's PS4 host. From there you just hit the left trigger twice and that will give you a URL redirector. And then the URL you want to go to is the seven and one host by Echo Stretch, which is the only one I've seen so far, but I'm sure there'll be other websites hosting it as well soon. So, the site you want to go to is 7 In 1 PS4 Hosts (es7in1.site). Head to that website, go to the Es tab in the top left-hand corner and you will see the 4.03 debug settings option that you can run on the PS Five. And what you want to do is wait for all the text to appear. Now it's likely going to crash at some point during the loading of the exploit where you'll just have to reboot the PS Five and try again. However. If it works, all the way to the point where it says Enable Debug Settings and then below that it says RPC server triggering in 10 seconds or whatever. That's the point where you should be able to exit the browser and you should press Circle to exit the browser. Not the PS button and not Options and Close Page because otherwise it will panic, and the debug settings should then be enabled for you, and you can access them. So that's what we've got right there. That's a quick way of loading the exploit without having to go through all the hassle of setting up the hosting files yourself from the GitHub a page from Specter, because you can do it this way as well, where you manually host it using these Python scripts. But obviously that's quite a bit involved when it comes to getting that all set up. So, it's easier to just go to a site that's already hosting the exploit for you. However, I will probably do a full tutorial once I can actually get the exploit running on my system. So yeah, anyway, there we go. So of course, it's worthwhile waiting as well for the BDJ exploit. i did notice this tweet from PSX Dev who said that basically showing after Spectre released his webkit version, he showed here that he's also got it working with the BDJ exploit. So, he's using the blurry disk exploit to trigger the same kernel exploit and you can see here in this picture:




 he's got the debug settings running here as well. Also, Sleirsgoevy's  himself has updated his implementation, he's added an untested, currently an untested sandbox escape, which is using the BDJ exploit. So yes, clearly there's quite a lot happening at the moment, everything sort of happens at once. So as things develop, I will of course update you guys more with more blogs. But yeah, that's what we have so far with the BDG exploits as well. So, it probably won't be too long before we see an implementation using the BDJ exploit, which again, hopefully should work on slightly higher firmware than 4.03, meaning 4.54.51 should be accessible, but right now it's 4.03 or lower.

Comments