Toggle menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

HENlo Vita: Difference between revisions

From GameBrew
No edit summary
No edit summary
Line 18: Line 18:
|source=https://github.com/TheOfficialFloW/HENlo
|source=https://github.com/TheOfficialFloW/HENlo
}}
}}
'''HENlo''' is a webKit+kernel exploit chain for all PS Vita firmwares. Check out [[HENlo JB Vita]] for a fully working exploit.
HENlo is a webKit+kernel exploit chain for all PS Vita firmwares. Check out [[HENlo JB Vita]] for a fully working exploit.
 
==Description==
This is a WIP from 3 years ago that I never finished (exploit is fully working, but hasn't been turned into a jailbreak yet).


The henlo exploit chain uses a vulnerability in Webkit as an entry point and one in the kernel, more similar to h-encore , although the latter would exploit an exploit in a game's state saves.
The henlo exploit chain uses a vulnerability in Webkit as an entry point and one in the kernel, more similar to h-encore , although the latter would exploit an exploit in a game's state saves.
Line 27: Line 24:
The kernel vulnerability, used in  h-encore , would be inside the SceNgs module, an audio engine designed for games to create sound effects, it is likely that this exploit was also using the same vulnerability in the kernel.
The kernel vulnerability, used in  h-encore , would be inside the SceNgs module, an audio engine designed for games to create sound effects, it is likely that this exploit was also using the same vulnerability in the kernel.


'''Note:''' As a reminder, this is not for end users, but for people who want to investigate a kernel exploit for fun and profit.
'''Note:''' As a reminder, this is not for end users, but for people who want to investigate a kernel exploit for fun and profit.
 
==Screenshot==
[[image:henlovita.jpg|640px]]


== External links ==
== External links ==
* Twitter - https://twitter.com/theflow0/status/1607753579825369092?s=46&t=l_bSW3qUMl9GgLZmkW8TEg
* Twitter - https://twitter.com/theflow0/status/1607753579825369092?s=46&t=l_bSW3qUMl9GgLZmkW8TEg
* Github - https://github.com/TheOfficialFloW/HENlo
* GitHub - https://github.com/TheOfficialFloW/HENlo
* Wololo - https://wololo.net/2022/12/28/ps-vita-theflow-releases-new-kernel-exploit-henlo-compatible-with-3-74/
* Wololo - https://wololo.net/2022/12/28/ps-vita-theflow-releases-new-kernel-exploit-henlo-compatible-with-3-74/
* Reddit - https://www.reddit.com/r/vitahacks/comments/zwhsxr/webkit_kernel_exploit_for_all_ps_vita_firmwares/
* Reddit - https://www.reddit.com/r/vitahacks/comments/zwhsxr/webkit_kernel_exploit_for_all_ps_vita_firmwares/

Revision as of 22:22, 26 Ocak 2023

HENlo
Henlovita.jpg
General
AuthorTheOfficialFloW
TypeExploits
Version2022
LicenseMIT License
Last Updated2022/12/26
Links
Download
Website
Source

HENlo is a webKit+kernel exploit chain for all PS Vita firmwares. Check out HENlo JB Vita for a fully working exploit.

The henlo exploit chain uses a vulnerability in Webkit as an entry point and one in the kernel, more similar to h-encore , although the latter would exploit an exploit in a game's state saves.

The kernel vulnerability, used in h-encore , would be inside the SceNgs module, an audio engine designed for games to create sound effects, it is likely that this exploit was also using the same vulnerability in the kernel.

Note: As a reminder, this is not for end users, but for people who want to investigate a kernel exploit for fun and profit.

External links

Advertising: