A collection of PS4 tools and experiments using the WebKit exploit. This is for firmware 1.76 only at the moment.
A live demo can be tried here.
You should clone the repo and upload it your own server if you wish to make changes:
git clone git://github.com/CTurt/PS4-playground.git
You can also download a zip of the latest source here.
Although this is this primarily a framework to help write and execute ROP chains, PS4-playground comes with several experiments for you to try.
After executing a test, you should either refresh the page, or close and reopen the browser entirely; running multiple experiments sequentially is not reliable.
Get PID
- Get process ID
Get Login
- Get login name and leak a kernel pointer
Get Loaded Modules
- Get a list of currently loaded modules, index and ID
Dump Loaded Module
- Dump a currently loaded module (use Get Loaded Modules
to see all available)
Load Module
- Load an additional module from this list
Once you have loaded a module, refresh the page, and you will be able to dump it.
Browse
- File Browser
Get PSN username
- Read your PSN username from account.dat
Get Sandbox Directory
- Get the name of the current sandbox directory (10 random characters which change each reboot)
Get Stack Protection
- Get stack base, size, and protection
Get Stack Name
- Get stack base, size, and name
Send Message
- Send a TCP message to the specified IP and port
File and memory dumps will be sent over TCP to the IP and port you specified.
You can use a simple tool like TCP-Dump to write the data to a file.