Skip to content

Commit

Permalink
Update README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
CrazeeGhost authored May 10, 2024
1 parent 5200c7f commit 6af6103
Showing 1 changed file with 1 addition and 58 deletions.
59 changes: 1 addition & 58 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,58 +1 @@
# PS4JbEmU

## Local PS4 Jailbreak Host with USB emulation
This project is aimed at setting up a local web host, with USB emulation, on select Raspberry Pi boards that can be used to exploit and jailbreak PS4 consoles running firmware version 9.00. Raspberry Pi Zero W / Pi Zero 2 W / Pi4 B are eligible boards as they support a USB on-the-go (OTG) gadget mode and eliminate the need to manually insert and remove the USB stick required in the exploit process. This project is implemented on a clean Raspberry Pi OS (Debian) install which makes it easier to repurpose the Pi to run additional applications and services on it.<br>
Developed and Tested on Raspberry Pi 4 B but should work on Pi Zero W / Pi Zero 2 W / Pi4 B

### Benefits
- Clean Raspberry Pi OS install - easy to setup the Pi for other purposes as you desire
- Easily update exploit, GoldHen and payload files from the web interface
- One device for local web server and USB emulation
- One USB cable is sufficient to power the Pi and emulate USB
- You can leave the Pi permanently connected to the PS4. No need not to remove and plug in a USB stick to run explolit

### Setup - Easy Method
1. Write the image provided in the releases to an SD card (using program like Pi Imager or Rufus)
2. Insert the SD card into the Raspberry Pi
3. For Pi Zero W & Pi Zero 2W, connect the USB marked Pi USB port to PS4. Be sure to use a cable that supports data transfer<br>
![image](https://user-images.githubusercontent.com/2664857/149229582-18780783-6d47-4d12-89ab-1898da33e1c7.png) <br />
4. For Pi4 B, connect a USB C cable from Pi to PS4
5. Power up the PS4. This should also boot up your Pi
6. Use `raspi-config` to expand the filesystem to the capacity of your SD card
7. On the PS4 go to Browser and visit http://<ip.address.of.your.pi>/ps4
8. Click on the GoldHen button for the version you want to exploit with
a. A popup will be thrown saying USB emulation started and wait for ps4 pop up
![image](https://user-images.githubusercontent.com/20742243/151671687-3a16a6db-a56e-45d8-bc13-9ff76598949d.png) <br />
b. Once the USB message disappears, Click ok
c. Gold Hen will load automatically
9. If you need SSH access, username is `pi` and password is `ps4free`

### Setup - Advanced Method
1. Install a clean Raspberry Pi OS image to an SD card (Developed and tested on Debian Bullseye)
2. Enable USB Gadget Mode on the Pi <br>
a. Add `dtoverlay=dwc2,dr_mode=peripheral` to the `[all]` section inside `/boot/config.txt`
3. Prevent the Pi from automatically becoming a USB gadget on every boot <br />
a. Add `sudo /sbin/modprobe -r g_mass_storage` to `/etc/rc.local`
5. Install and setup `lighttpd` and `PHP`
6. Enable fast cgi module for lighttpd <br />
a. `sudo lighttpd-enable-mod fastcgi fastcgi-php` <br />
b. `sudo systemctl reload lighttpd.service`
8. Configure `/var/www/html/ps4` as the document root directory for the exploit app (via `lighttpd` configs)
9. Clone or download the source code from this repo <br>
a. `cd /home/pi` <br>
b. `git clone https://github.com/CrazeeGhost/PS4JbEmu.git` <br />
10. Allow the webserver user to run modprobe as root without password <br>
a. Add `www-data ALL=(ALL) NOPASSWD: /sbin/modprobe` to your sudoers file using the `visudo` command
11. Make the web app accessible to the webserver (will not work if you did not follow the directory strcture in step 8)<br />
a. `cp /home/pi/PS4JbEmu/updateHost.sh /home/pi` <br />
b. `sudo chmod 755 /home/pi/updateHost.sh` <br />
c. `sudo /home/pi/updateHost.sh`
12. (Optional) Enable auto-updates via cron <br />
a. `sudo crontab -e` <br />
b. `*/30 * * * * /home/pi/updateHost.sh`

### Credits
1. Kameleonre_ - Porting PSFree Exploit
2. Sleirsgoevy – Webkit, Offline Activator
3. Chendochap – KeExploit
5. PaulJenkin – Inspiration for USB Emulation
# See Notes on individual releases

1 comment on commit 6af6103

@PNRMgamestore
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hello everything is fine. I saw your new script, but I have some questions if you could help me, I would really appreciate it. I use the GitHub image to install on the rsspbarry memory card. Then, will I have to make the settings with PuTTY? Or is your image already prepared with xploit replay script on PS4? folder that I activated in the PPPoE settings on the PS4 and after recording the image on the Raspberry SD card, I connect it via network cable to the PS4 and it should start running xploit?

Please sign in to comment.