sleirsgoevy Profile
sleirsgoevy

@sleirsgoevy

Followers
11,765
Following
0
Media
5
Statuses
121
Explore trending content on Musk Viewer
@sleirsgoevy
sleirsgoevy
3 years
Mira for 7.55. JB 7.55 with patches by AlAzif and ChendoChap.
178
199
1K
@sleirsgoevy
sleirsgoevy
3 years
I can confirm that this exploit indeed works on 7.55 without any changes. Still no Mira/HEN though.
98
103
934
@sleirsgoevy
sleirsgoevy
3 years
Webkit PoC for 9.00, achieves arbitrary read/write and addrof/fakeobj
93
159
937
@sleirsgoevy
sleirsgoevy
3 years
7.50, expects payload on 9020/tcp. Applied patches: mmap, mprotect, syscall everywhere, kexec, delayed panics. Note: there is no Mira/HEN for 7.50 yet!
142
151
891
@sleirsgoevy
sleirsgoevy
3 years
Some valid 7.02 addresses: 0x200eb00d8 0x200f300d8 0x200fb00d8 0x2011100d8 The success rate is about 10% for the last one. Unfortunately the exploit then crashes in the critical section in leakJSC. Will now investigate how to fix it.
91
61
630
@sleirsgoevy
sleirsgoevy
3 years
P.S. No kernel exploit is out, DO NOT UPDATE
73
61
628
@sleirsgoevy
sleirsgoevy
3 years
Probably the last standalone update for 7.5x. Will set up a proper host soon.
69
72
607
@sleirsgoevy
sleirsgoevy
2 years
Partial reimplementation of BD-JB (without kernel part): ISO image: Built with "PS3 BD-J DevKit":
55
126
596
@sleirsgoevy
sleirsgoevy
2 years
To clarify: I am NOT dead, I am NOT in Ukraine, and I have NOT been recruited into the army. Everyone telling the opposite is a detractor.
57
31
559
@sleirsgoevy
sleirsgoevy
3 years
Tweet media one
62
53
532
@sleirsgoevy
sleirsgoevy
3 years
Another FreeBSD PoC, now utilizing TheFlow's hint. Does not do any zone drains, so should be more portable. Fun fact: it **seems** that the function tweeted by TheFlow does not need to be buggy. A patched one would also do its job.
59
93
508
@sleirsgoevy
sleirsgoevy
3 years
Fix for the crash in leakJSC(): after debug_log("[+] Got a relative read"); insert var tmp_spray = {}; for(var i = 0; i < 100000; i++) tmp_spray['Z'.repeat(8 * 2 * 8 - 5 - LENGTH_STRINGIMPL) + (''+i).padStart(5, '0')] = 0x1337;
63
44
460
@sleirsgoevy
sleirsgoevy
2 years
BD-JB for PS5 with payload support (port 9019).
32
94
439
@sleirsgoevy
sleirsgoevy
3 years
Remove line 525 in jb.c & recompile to fix crash when forking webkit.
32
34
428
@sleirsgoevy
sleirsgoevy
2 years
So my 9.00 host is finally up: Use with caution. Web activator Soon™
36
40
430
@sleirsgoevy
sleirsgoevy
1 year
PS5 payload loader host for 4.03 now up on . Accepts payloads in PLD format (.bin), ELF payloads not supported.
63
90
436
@sleirsgoevy
sleirsgoevy
2 years
A crazy idea for "PS4 modchip" makers (that just bundle a wifi hotspot with preloaded hosts into an esp8266 chip): make your chips also emulate a usb connection and insert/remove the fake drive at the right time. This way your stuff will be finally of some use.
26
34
419
@sleirsgoevy
sleirsgoevy
2 years
Seems that I've finally caught the post-exploit instability issue some people discussed. Here it is: (You will also want to diff that to the original poc, there are some other changes)
39
34
370
@sleirsgoevy
sleirsgoevy
3 years
PoC for the FontFaceSet vulnerability, which was wrongly classified as a use-after-free. Works only on PC for now. Please check if this prints "failed to guess..." for you. Especially interested in reports from 9.00.
47
56
372
@sleirsgoevy
sleirsgoevy
2 years
updated for 9.00
21
42
360
@sleirsgoevy
sleirsgoevy
2 years
PS5 rootvnode listdir PoC.
23
64
340
@sleirsgoevy
sleirsgoevy
3 years
Added 7.50-7.55 support to the Hamachi port. Not tested ingame.
31
43
335
@sleirsgoevy
sleirsgoevy
2 years
Seems that Mega has not updated the ISO link for the new BD-JB update. Here is the new one:
35
54
345
@sleirsgoevy
sleirsgoevy
3 years
Hmm, have I really got unblocked? If so, here is a thing I worked on while blocked: PoC X86->ARM, passes tests from
55
26
328
@sleirsgoevy
sleirsgoevy
5 months
The porting tool for ps5-kstuff is now complete. If your firmware is not supported yet, please follow [this guide]() and dump the offsets. ESPECIALLY if you're on some weird firmware like 3.10 or 4.02.
33
57
340
@sleirsgoevy
sleirsgoevy
3 years
Added the dynlib_dlsym patch by @_AlAzif . Does not seem to fix payloads.
15
30
297
@sleirsgoevy
sleirsgoevy
3 years
BTW just finished another something-to-browser port. Remote package installation over NetCat! (Well, not actually...) Source code: Windows EXE: Linux users, build from source.
23
42
291
@sleirsgoevy
sleirsgoevy
3 years
Found a TYPO in the 672.html page in my ps4-web-activator repository. Now hopefully fixed.
Tweet media one
16
18
279
@sleirsgoevy
sleirsgoevy
3 years
7.02 netcat 9020 payload: Mira by @_alazif does not work yet.
25
38
261
@sleirsgoevy
sleirsgoevy
2 years
Updated payload server, now also cleans up after exploit.
18
55
273
@sleirsgoevy
sleirsgoevy
3 years
Finally seem to have fixed spurious crashes in the web activator. P.S. Credits: charlyzard for the original implementation.
17
34
261
@sleirsgoevy
sleirsgoevy
2 years
Just got reminded that I forgot to upload fixed package installer binary. Here it is:
34
27
258
@sleirsgoevy
sleirsgoevy
2 years
I can report that X86 trap flag works as usual in PS5's executable-only memory. There is no stupid "anti-debug protection" here.
19
25
251
@sleirsgoevy
sleirsgoevy
3 years
"Mira not working" turned out to be ENTIRELY my own fault. I accidentially pointed the kexec syscall to "jmp rsi" instead of "jmp [rsi]". Regexe match groups do not play well with AT&T notation... P.S. Still needs checking whether homebrew will run...
30
17
237
@sleirsgoevy
sleirsgoevy
2 years
bgft-sender.exe updated for GoldHEN loader.
13
40
245
@sleirsgoevy
sleirsgoevy
3 years
Wait, what? Are they really storing kernel pointers inside an mbuf's data area??
12
26
238
@sleirsgoevy
sleirsgoevy
2 years
Added code for truly arbitrary function call. The PoC now lists /, which is not possible from Java. ISO:
27
43
239
@sleirsgoevy
sleirsgoevy
2 years
If you have a rooted Android, you can try using [these scripts]( ) to emulate plugging/unplugging the drive. Tested on Samsung A6.
16
31
232
@sleirsgoevy
sleirsgoevy
2 years
TL;DW: Probably a PS-specific crasher, unlikely to be exploitable
18
27
222
@sleirsgoevy
sleirsgoevy
3 years
Temporary host for the PoC:
38
33
222
@sleirsgoevy
sleirsgoevy
3 years
Added Base64-encoded PSN ID to the web activator. Necessary for Chiaki activation.
14
20
210
@sleirsgoevy
sleirsgoevy
3 years
Just in case anybody still cares: HTMLTextAreaElement address statistics on 7.02. key = address in decimal, value = number of occurrencies per 30 runs. Extracted using a debugger with HEN already activated, not via the exploit, so no survivorship bias.
13
25
194
@sleirsgoevy
sleirsgoevy
3 years
Unfortunately, type-confusing these pointers does not seem to be possible, due to it using a special mbuf type (MT_CONTROL). It may be possible to turn it into UAF on struct file, but that is also zone-allocated, and most file destructors put it into invalid state.
26
12
182
@sleirsgoevy
sleirsgoevy
3 years
@SpecterDev @tihmstar select (f_poll) is a better target than ioctl (f_ioctl) imo. It only checks that the refcount is nonzero, while ioctl also checks that the mode allows either read or write.
7
8
186
@sleirsgoevy
sleirsgoevy
3 years
@SpecterDev Regarding zone reclaim on PS4, in this specific exploit the PS4 (for some weird reason) allocates even small packets in mbufs with clusters, i.e. the mbuf_packet zone, and to drain that you need to exhaust all clusters. That is the only way to do it, uma_reclaim does not work.
9
8
171
@sleirsgoevy
sleirsgoevy
4 years
Hamachi ready: P.S. IDK whether PS4 games will work through it. Only tested with the web browser. At least the console can still be pinged when running a game.
6
34
163
@sleirsgoevy
sleirsgoevy
2 years
Added a log dumping function to my Hamachi frontend. If you encounter mysterious errors, please attach the dumped logs to your bug report.
7
10
158
@sleirsgoevy
sleirsgoevy
3 years
Tweet media one
10
4
157
@sleirsgoevy
sleirsgoevy
2 years
Fixed "web lb" mode being broken on the Hamachi port. This fixes connection problems on some networks.
9
26
154
@sleirsgoevy
sleirsgoevy
3 years
@goten_rsa Will probably come in a few more days. But this is not a promise.
9
4
152
@sleirsgoevy
sleirsgoevy
4 years
Tweet media one
10
18
148
@sleirsgoevy
sleirsgoevy
3 years
Game over. No more reports are accepted, I've had enough.
29
9
136
@sleirsgoevy
sleirsgoevy
3 years
@Goukifafa The kernel exploit just completed. Now what's left is just to put mira on top of it.
11
12
135
@sleirsgoevy
sleirsgoevy
3 years
Regarding the new exploit disclosed at BHEU: could anybody run this () or equivalent code on 5.05/other non-6.XX firmware and send the logs to me? The pattern is obvious, but I'd like to know what differences to expect and what to brute for.
6
22
124
@sleirsgoevy
sleirsgoevy
5 months
You can verify the found offsets by running the script test_offsets.py with the same arguments. It should launch a ps5-kstuff that can run fPKG files.If that works, please submit your JSON file either [here](),or to the "testing" channel on PS5 R&D Discord.
6
19
133
@sleirsgoevy
sleirsgoevy
3 years
Once again, for those who didn't get the point. This link () should be visited from your PS4 which is on **5.05**. It is not a new exploit, all it does is collect some statistics that could be useful for porting the BHEU exploit to 7.02.
18
14
119
@sleirsgoevy
sleirsgoevy
2 years
P.S. I mean the 9.00 webkit
3
6
115
@sleirsgoevy
sleirsgoevy
3 years
@_AlAzif It's not just dlsym. The payloads uses dlopen with just library name, not full path, and that fails.
1
5
115
@sleirsgoevy
sleirsgoevy
3 years
The infinite scrolling bug is now FIXED!
8
5
100
@sleirsgoevy
sleirsgoevy
3 years
@AbanoubIbrahim9 This MIGHT lead to a better exploit than the published PoC.
6
0
98
@sleirsgoevy
sleirsgoevy
5 months
P.S. You can check the list of currently supported firmwares here:
4
14
98
@sleirsgoevy
sleirsgoevy
3 years
EDIT: It does not. No debug settings, and running any application results in a panic.
4
6
87
@sleirsgoevy
sleirsgoevy
2 years
You can also try using "DriveDroid" or "USB Mountr" apps, whatever one works for you.
3
3
80
@sleirsgoevy
sleirsgoevy
3 years
@_AlAzif Just tried to run the 7.02 Mira build. And you guessed it, it does not run. I can't even see the "waiting for payloads" popup. [Probably the boot patches are the cause.]
10
8
78
@sleirsgoevy
sleirsgoevy
3 years
UPDATE: I made a one-click 5.05 version of the code from previous post. Cannot test it though:( P.S. Please do not post-scan/exploit/DDoS the server. I hope it is secure, but please do not abuse. P.P.S. The logs will be sent unencrypted.
4
10
71
@sleirsgoevy
sleirsgoevy
3 years
Added a few debug alerts. They should give some clue on why it is failing to collect data. If it failed for you, please try visiting the link again.
3
6
70
@sleirsgoevy
sleirsgoevy
4 years
In case somebody else got confused: this is NOT a 7.02 webkit exploit.
6
3
59
@sleirsgoevy
sleirsgoevy
3 years
@PS4Trainer I identified the problem with WebRTE on my exploit host. Your payload expects being loaded at a constant address (possibly 0x926200000), i.e. is not PIE, but MiraLoader maps the payload at a system-provided address, so it only works with PIE payloads.
3
7
61
@sleirsgoevy
sleirsgoevy
2 months
Я конечно максимально далёк от политики, но в это воскресенье некто ВВП пойдёт продлеваться ещё на 6 лет. Если вам тоже кажется, что это плохая идея -- идите на участки и голосуйте за любого другого кандидата. Или ставьте несколько галочек: порча бюллетеня -- голос против всех.
12
5
62
@sleirsgoevy
sleirsgoevy
4 years
Just fixed broadcasts in the PS4 Hamachi port. Call of Duty should now technically work, but the framerate is unplayable.
5
6
49
@sleirsgoevy
sleirsgoevy
3 years
@Goukifafa contains the combined jb+netcat payload. You can try your luck with sending payloads to it, but Mira/HEN are not working yet.
2
7
43
@sleirsgoevy
sleirsgoevy
2 years
@notzecoxao Как померять высоту здания с помощью барометра? Бросить его с крыши и засечь, сколько он будет падать.
3
2
46
@sleirsgoevy
sleirsgoevy
5 months
@notnotzecoxao Or even better, run the porting tool and contribute the offsets for ps5-kstuff.
3
4
47
@sleirsgoevy
sleirsgoevy
3 years
@Evolu77ion Very good result IMO.
2
2
45
@sleirsgoevy
sleirsgoevy
3 years
@Louzi19881279 I think no valuable improvement will be done unless a new bug surfaces (at least an infoleak).
3
4
40
@sleirsgoevy
sleirsgoevy
3 years
@rasheed_daley This one doesn't work, but it will once ported. It should say that it failed to guess.
2
2
39
@sleirsgoevy
sleirsgoevy
3 years
@Npn763 It is present in 7.50 (and the 7.02 version works unmodified), but not in 8.00.
0
1
37
@sleirsgoevy
sleirsgoevy
2 years
@notzecoxao Should be possible to chain with a SELF dumper. I've verified that mapping itself works.
2
2
34
@sleirsgoevy
sleirsgoevy
3 years
Something very weird is happening. I do see requests to static stuff in the server logs, but no POST requests with actual logs. Probably the code fails somewhere. Any chance to get a screenshot with error? P.S. You do not need to activate any HEN first. At least I think so.
1
2
33
@sleirsgoevy
sleirsgoevy
4 years
@_AlAzif The way it has been added is wrong. It is now broken due to exploit.js being minified. Please upload a non-minified version of exploit.js instead. Also the success rate is more like 30%, 10 retries is my personal worst-case.
10
0
34
@sleirsgoevy
sleirsgoevy
3 years
@Byrek3d @SpecterDev @tihmstar This is OK. In fact it was never intended to be pronounced.
1
0
28
@sleirsgoevy
sleirsgoevy
3 years
@zhovner @stripe If you wished them luck, you wouldn't turn them away. Flipper is by no means a telephone, and that means that this is a PERSONAL attack on this specific project. Either get the fact that this is OK, or stop playing a role and tell the real reason.
1
0
25
@sleirsgoevy
sleirsgoevy
3 years
@Harsh83106577 No, I have 6.72 data myself. What i want to see is how 5.05 is different from 6.72, to get an insight into what how it changes between firmwares and what to expect on 7.02.
1
0
17
@sleirsgoevy
sleirsgoevy
5 months
@rohanmannan @notnotzecoxao This is for the PS5 versions 3.00 to 4.51 that have a kernel exploit.
1
0
17
@sleirsgoevy
sleirsgoevy
2 years
@AbubakarShnk It does not need to. It will just need to replay the pre-created image, no need to understand its inner structure.
1
0
14
@sleirsgoevy
sleirsgoevy
3 years
@ps3120 @errorfishy Do not touch anything on your gamepad while the exploit is running.
2
1
13
@sleirsgoevy
sleirsgoevy
3 years
@AR_JRIDI This is not an exploit. I am trying to collect statistics about how the unknown address changes between firmwares. I have the 6.72 data myself and am trying to collect some logs from 5.05 owners.
1
0
10
@sleirsgoevy
sleirsgoevy
3 years
@84Ciss @_AlAzif Neither. It just crashes in userland.
3
2
10
@sleirsgoevy
sleirsgoevy
3 years
@danilel_tw @MSZ_MGS @_AlAzif No, if it does not crash then it is probably listening.
0
2
8
@sleirsgoevy
sleirsgoevy
4 years
@RSPxAndrew2007x Right, it's going to be a PS4 port of that.
1
0
8
@sleirsgoevy
sleirsgoevy
2 years
@jeddaikyut15 @GamerHack93 Restart and try again. Happens sometimes.
1
0
7
@sleirsgoevy
sleirsgoevy
3 years
1
0
7