PS4 NEW PS4 Exploit - REST MODE vulnerability on 5.xx FW detailed by vpikhur

Discussion in 'PS4 News' started by STLcardsWS, Feb 7, 2018.

By STLcardsWS on Feb 7, 2018 at 7:54 PM
  1. 6,589
    4,697
    123
    STLcardsWS

    STLcardsWS Administrator

    Joined:
    Sep 18, 2014
    Messages:
    6,589
    Likes Received:
    4,697
    Trophy Points:
    123
    Well here is some interesting news in the PS4 world, so maybe running out and finding that Second PS4 on v4.05 might not be the only avenue to exploit the PS4 in the near future. There has been a hacker Volodymyr Pikhur (@vpikhur) who has been holding onto an exploit for over 2 years now and it involves Attacking the PS4 while in REST MODE and seems to be a powerful exploit with alot of potential and its said to be compatible with v5.XX Firmware!!!.The developer held a presentation of this exploit @ RECON BRUSSELS 2018, the information provided is much like fail0verflow presentation's of past hacks where it should point hackers (& Sony) in how the exploit can be achieved and where the vulnerability lies, from here it looks like it will be up to other hackers to build the exploit. If this is indeed supporting latest firmware's then any future updating would not be advised, and will be a great window for the PS4.
    PS4_Rest_Mode.png

    • canvas.png index.png
      (click to enlarge slides (complete slide seen here) )

      REcon 2018
      • This presentation will talk about how custom Southbridge silicon, responsibe for background downloads while main SoC is off, didn’t help to secure Playstation 4. It will explain how a chain of exploits combined with hardware attacks will allow code to run in the context of the secure bootloader, extract private keys, and sign a custom kernel.




    PDF (Presentation Slides): REcon Brussels 2018.pdf
    Source(s): witter.com/vpikhur / github.com/hwroot/ / recon.cx
     
    Last edited: Feb 10, 2018

Comments

Discussion in 'PS4 News' started by STLcardsWS, Feb 7, 2018.

Share This Page