Toggle menu
Toggle personal menu
Not logged in
Your IP address will be publicly visible if you make any edits.

PS4JbEmU

From GameBrew
PS4JbEmU
Ps4jbemu.png
General
AuthorCrazeeGhost
TypeExploits
Version4.6
LicenseMixed
Last Updated2024/10/31
Links
Download
Website
Source

This project aims to set up a local web host with USB emulation on select Raspberry Pi boards. These boards can be used to exploit and jailbreak PS4 consoles running firmware version 11.00. The eligible boards include Raspberry Pi Zero W, Pi Zero 2 W, and Pi4 B, as they support a USB on-the-go (OTG) gadget mode. This feature eliminates the need to manually insert and remove the USB stick required in the exploit process. The project is implemented on a clean Raspberry Pi OS (Debian) install, making it easier to repurpose the Pi to run additional applications and services.

The project was developed and tested on Raspberry Pi 4 B, but it should also work on Pi Zero W, Pi Zero 2 W, and Pi4 B.

Benefits

  • Clean Raspberry Pi OS install: Makes it easy to set up the Pi for other purposes as desired.
  • Easy updates: Exploit, GoldHen, and payload files can be easily updated from the web interface.
  • All-in-one device: Serves as a local web server and provides USB emulation.
  • Single USB cable: One USB cable is sufficient to power the Pi and emulate USB.
  • Permanent connection: The Pi can be left permanently connected to the PS4, eliminating the need to remove and plug in a USB stick to run the exploit.

Instructions For PS4

PS4 Setup

  • Go to Settings and then Network
  • Select Set Up Internet connection and choose Use a LAN Cable
  • Choose Custom setup and choose PPPoE for IP Address Settings
  • Enter ps4 for both PPPoE User ID and PPPoE Password
  • Choose Automatic for DNS Settings and MTU Settings
  • Choose Do Not Use for Proxy Server

Pi

  1. Download and burn image onto a 2GB or larger micro SD card
  2. Navigate to the boot partition/drive on the SD card and change the first line of pppwn-cpp.txt as follows -
Target FW File Contents
9.00 900
9.60 960
10.00 1000
10.01 1001
10.50 1050
10.70 1070
10.71 1071
11.00 1100
  1. Change the second line of pppwn-cpp.txt as follows -
    • If you want to shutdown the Pi after Jailbreak, change the second line to postjb=shutdown
    • If you want to connect the PS4 to internet using the Pi's WiFi, change the second line to postjb=pppoe
      • On line 3, you can specify the DNS Server the PS4 should use for the PPPoE connection
  2. Insert the micro SD card into a Raspberry Pi
  3. Optional - Connect the Pi to your WiFi (easiest using sudo raspi-config). Then power if off.
  4. Download and extract SiSTR0's GoldHEN v2.4b18
  5. Copy goldhen.bin to the root of an exFAT formatted USB drive
  6. Plug the USB Drive into a USB port on your PS4
  7. Connect the Pi to your PS4 via an Ethernet cable and power on both devices.
  8. Wait for notifications confirming GoldHEN was loaded. This should happen within 2-3 minutes depending on how many attempts are required for that instance. If nothing happens within 5 minutes of boot up, I recommend restarting both the Raspberry Pi and the PS4.

Notes

  • This is the pppwn_cpp Jailbreak for PS4 running software versions in the title of the release only
  • Tested on Raspberry Pi 3 Model B
  • If you followed step 5 above, your PS4 will have internet access which may result in your PS4 updating it's system software. You have been warned.
  • After the first successful load of GoldHEN, you do not need to repeat steps 6 through 8 for subsequent runs on the same PS4
  • Auto updates the pppwn_cpp exploit binary at device boot (if internet available)
  • If postjb=pppoe config is set, PS4 can access internet if Pi is connected to WiFi and only after successful Jailbreak
  • No need to restart Pi if Re-Jailbreaking after PS4 was shutdown/restarted (PS4 must have stayed off for at least 30 seconds)
  • Handles exceptions when PS4 crashes during exploit or if the exploit itself halts or hangs

Changelog

v4.6

  • Added Support for FW 10.50, 10.70 & 10.71 via GoldHen
  • Fixed bug that caused KP when using 64bit OS
  • Added post JB config options
  • Moved pppwn binaries and payloads to /boot/pppwn-cpp for better maintainability

v4.5

  • Added post JB config options
  • Moved pppwn binary and payloads to /boot/pppwn-cpp for better maintainability and scale ability

v4.4

  • Added support for 9.60
  • Added support for 10.50 via Echo Stretch's HEN
  • Added option to shutdown pi after Jailbreaking PS4
  • Moved payloads to /boot/payloads for better maintainability and scale ability

v4.3

  • Added support for 10.50, 10.70, 10.71 via Echo Stretch's HEN.

v4.2

  • Added support for FW 10.0x.

v4.1

  • Auto update the pppwn_cpp exploit binary at device boot (if internet available)
  • PS4 can access internet if Pi is connected to WiFi and only after successful Jailbreak
  • No need to restart Pi if Re-Jailbreaking after PS4 was shutdown/restarted (PS4 must have stayed off for at least 30 seconds)
  • Better handling of exception when PS4 crashes during exploit
  • Handle if exploit halts or hangs

v4.0

  • Auto update the pppwn_cpp exploit binary at device boot (if internet available)
  • PS4 can access internet if Pi is connected to WiFi and only after successful Jailbreak
  • No need to restart Pi if Re-Jailbreaking after PS4 was shutdown/restarted (PS4 must have stayed off for at least 30 seconds)
  • Better handling of exception when PS4 crashes during exploit
  • Handle if exploit halts or hangs

v4.0-b1

  • Using the C++ version of the PPPwn exploit
  • Added support for FW 9.00

v3.0-b1

  • PS4 11.00 Auto PPPwn Jailbreak.

v2.0

  • Local PS4 9.00 Jailbreak Host with USB emulation.

v1.1

  • Minor tweaks and README updates.

v1.0

  • First Release.

Credits

External links

Advertising: