Toggle menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

HENlo Vita: Difference between revisions

From GameBrew
No edit summary
No edit summary
 
(4 intermediate revisions by the same user not shown)
Line 1: Line 1:
{{#seo:
|title=Vita Homebrew Apps (Exploits) - GameBrew
|title_mode=append
|image=henlovita.jpg
|image_alt=HENlo
}}
{{Infobox Vita Homebrews
{{Infobox Vita Homebrews
|title=HENlo
|title=HENlo
Line 14: Line 8:
|version=2022
|version=2022
|license=MIT
|license=MIT
|download=https://dlhb.gamebrew.org/vitahomebrews/henlovita.7z
|download=https://dlhb.gamebrew.org/vitahomebrews/henlo.zip
|website=https://twitter.com/theflow0/status/1607753579825369092?s=46&t=l_bSW3qUMl9GgLZmkW8TEg
|website=https://twitter.com/theflow0/status/1607753579825369092
|source=https://github.com/TheOfficialFloW/HENlo
|source=https://github.com/TheOfficialFloW/HENlo
}}
}}
'''HENlo''' is a webKit+kernel exploit chain for all PS Vita firmwares.
{{#seo:
|title=Vita Homebrew Apps (Exploits) - GameBrew
|title_mode=append
|image=henlovita.jpg
|image_alt=HENlo
}}


==Description==
HENlo is a webKit+kernel exploit chain for all PS Vita firmwares. Check out [[HENlo JB Vita]] for a fully working exploit.
This is a WIP from 3 years ago that I never finished (exploit is fully working, but hasn't been turned into a jailbreak yet).


The henlo exploit chain uses a vulnerability in Webkit as an entry point and one in the kernel, more similar to h-encore , although the latter would exploit an exploit in a game's state saves.
The henlo exploit chain uses a vulnerability in Webkit as an entry point and one in the kernel, more similar to h-encore , although the latter would exploit an exploit in a game's state saves.
Line 27: Line 25:
The kernel vulnerability, used in  h-encore , would be inside the SceNgs module, an audio engine designed for games to create sound effects, it is likely that this exploit was also using the same vulnerability in the kernel.
The kernel vulnerability, used in  h-encore , would be inside the SceNgs module, an audio engine designed for games to create sound effects, it is likely that this exploit was also using the same vulnerability in the kernel.


'''Note:''' As a reminder, this is not for end users, but for people who want to investigate a kernel exploit for fun and profit.
'''Note:''' As a reminder, this is not for end users, but for people who want to investigate a kernel exploit for fun and profit.
 
==Online Version By SKGleba==
* Pushed a test version of the henlo webkit-based jailbreak for Playstation Vita/TV units on 3.65-3.74.
* Visit http://deploy.psp2.dev via the vita browser.
* Debug logging is enabled, it still needs some stability testing.
 
==Screenshot==
[[image:henlovita.jpg|640px]]


== External links ==
== External links ==
* Online Version (SKGleba) - https://deploy.psp2.dev/
* GitHub - https://github.com/TheOfficialFloW/HENlo
* Twitter (SKGleba) - https://twitter.com/skgleba/status/1608141520141426688
* Twitter - https://twitter.com/theflow0/status/1607753579825369092?s=46&t=l_bSW3qUMl9GgLZmkW8TEg
* Twitter - https://twitter.com/theflow0/status/1607753579825369092?s=46&t=l_bSW3qUMl9GgLZmkW8TEg
* Github - https://github.com/TheOfficialFloW/HENlo
* Wololo - https://wololo.net/2022/12/28/ps-vita-theflow-releases-new-kernel-exploit-henlo-compatible-with-3-74/
* Wololo - https://wololo.net/2022/12/28/ps-vita-theflow-releases-new-kernel-exploit-henlo-compatible-with-3-74/
* Reddit - https://www.reddit.com/r/vitahacks/comments/zwhsxr/webkit_kernel_exploit_for_all_ps_vita_firmwares/
* Reddit - https://www.reddit.com/r/vitahacks/comments/zwhsxr/webkit_kernel_exploit_for_all_ps_vita_firmwares/

Latest revision as of 07:37, 4 August 2024

HENlo
Henlovita.jpg
General
AuthorTheOfficialFloW
TypeExploits
Version2022
LicenseMIT License
Last Updated2022/12/26
Links
Download
Website
Source


HENlo is a webKit+kernel exploit chain for all PS Vita firmwares. Check out HENlo JB Vita for a fully working exploit.

The henlo exploit chain uses a vulnerability in Webkit as an entry point and one in the kernel, more similar to h-encore , although the latter would exploit an exploit in a game's state saves.

The kernel vulnerability, used in h-encore , would be inside the SceNgs module, an audio engine designed for games to create sound effects, it is likely that this exploit was also using the same vulnerability in the kernel.

Note: As a reminder, this is not for end users, but for people who want to investigate a kernel exploit for fun and profit.

External links

Advertising: