{"id":2256,"date":"2015-02-01T14:11:47","date_gmt":"2015-02-01T13:11:47","guid":{"rendered":"https:\/\/www.customprotocol.com\/?p=2256"},"modified":"2015-02-01T14:11:47","modified_gmt":"2015-02-01T13:11:47","slug":"173210-annonce-un-nouvel-exploit-pour-les-comptes-jp","status":"publish","type":"post","link":"https:\/\/www.customprotocol.com\/173210-annonce-un-nouvel-exploit-pour-les-comptes-jp\/","title":{"rendered":"[Vita] 173210 annonce un nouvel exploit pour les comptes JP"},"content":{"rendered":"<p style=\"text-align: justify;\"><div align=\"justify\" class=\"signoff\"><i class=\"fa fa-fw fa-globe\"><\/i>Mise \u00e0 jour&nbsp;: <a title=\"Les fichiers des TN-C et ARK-2 pour Hatsune Miku: Project Diva Extend publi\u00e9s\" href=\"https:\/\/www.customprotocol.com\/underground\/les-fichiers-des-tn-c-et-ark-2-pour-hatsune-miku-project-diva-extend-publies\/\" target=\"_blank\" rel=\"noopener noreferrer\">fichiers disponibles ici<\/a>&#8239;!<\/div>\n<p style=\"text-align: justify;\">Alors que la plupart des <em>hackers<\/em> profitent pleinement de l'<a title=\"M\u00e0J&nbsp;-&nbsp;Le VHBL Installer v3.2 pour Patapon 2 est dispo&#8239;!\" href=\"https:\/\/www.customprotocol.com\/underground\/le-vhbl-installer-pour-patapon-2-est-dispo\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>exploit <\/strong><em>Patapon 2<\/em><\/a> en s'amusant avec le <a title=\"TUTO&nbsp;-&nbsp;Installer le VHBL en 3.36 (Patapon 2)\" href=\"https:\/\/www.customprotocol.com\/underground\/tuto-installer-le-vhbl-en-3-36-patapon-2\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>VHBL<\/em><\/a> ou les <a title=\"TUTO&nbsp;-&nbsp;Custom Bubbles&nbsp;: cr\u00e9ez vos propres \u201cbulles\u201d sur PS Vita\" href=\"https:\/\/www.customprotocol.com\/underground\/tuto-custom-bubbles-creez-vos-propres-bulles-sur-ps-vita\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>custom bubbles<\/em><\/a> tout en sirotant un jus d'ananas (prononcer ananasse, merci), le d\u00e9veloppeur <a title=\"Twitter anglais de 173210\" href=\"https:\/\/twitter.com\/173210_en\" target=\"_blank\" rel=\"noopener noreferrer\"><em>173210<\/em><\/a> \u00e9paul\u00e9 de\u00a0<a title=\"Twitter de karehaani\" href=\"https:\/\/twitter.com\/karehaani\" target=\"_blank\" rel=\"noopener noreferrer\"><em>karehaani<\/em><\/a> vient de publier pour les Japonais un second <strong>exploit<\/strong> apparemment de type <a title=\"Qu\u2019est-ce qu\u2019un \u201cexploit\u201d dans le milieu du hack&#8239;?\" href=\"https:\/\/www.customprotocol.com\/underground\/quest-ce-quun-exploit-dans-le-milieu-du-hack\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>kernel<\/strong><\/a> puisque compatible avec le nouvel <em>eCFW <a title=\"Un exploit kernel d\u00e9couvert sur le 3.36\" href=\"https:\/\/www.customprotocol.com\/underground\/un-kernel-exploit-decouvert-sur-le-3-36\/\" target=\"_blank\" rel=\"noopener noreferrer\">ARK-2<\/a><\/em><a title=\"Un exploit kernel d\u00e9couvert sur le 3.36\" href=\"https:\/\/www.customprotocol.com\/underground\/un-kernel-exploit-decouvert-sur-le-3-36\/\" target=\"_blank\" rel=\"noopener noreferrer\"> de <em>Qwikrazor87<\/em><\/a>. Fonctionnant sur le <em>firmware<\/em> 3.36 (dernier en date \u00e0 l'heure o\u00f9 j'\u00e9cris ces lignes), ce serait le jeu <strong>Hatsune Miku: Project DIVA Extend <\/strong>qui poss\u00e9derait la faille <em>kernel<\/em>.<\/p>\n<figure id=\"attachment_2260\" aria-describedby=\"caption-attachment-2260\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.customprotocol.com\/medias\/2015\/02\/Hatsune-Miku-Project-DIVA-F-2nd-105.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-2260\" src=\"https:\/\/www.customprotocol.com\/medias\/2015\/02\/Hatsune-Miku-Project-DIVA-F-2nd-105.jpg\" alt=\"Photo de la belle Hatsune Miku...\" width=\"500\" height=\"283\" srcset=\"https:\/\/www.customprotocol.com\/medias\/2015\/02\/Hatsune-Miku-Project-DIVA-F-2nd-105.jpg 500w, https:\/\/www.customprotocol.com\/medias\/2015\/02\/Hatsune-Miku-Project-DIVA-F-2nd-105-300x170.jpg 300w, https:\/\/www.customprotocol.com\/medias\/2015\/02\/Hatsune-Miku-Project-DIVA-F-2nd-105-370x209.jpg 370w, https:\/\/www.customprotocol.com\/medias\/2015\/02\/Hatsune-Miku-Project-DIVA-F-2nd-105-270x153.jpg 270w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><figcaption id=\"caption-attachment-2260\" class=\"wp-caption-text\">Photo de la belle Hatsune Miku...<\/figcaption><\/figure>\n<p style=\"text-align: justify;\">Bien que le jeu soit assez cher (pr\u00e8s de 40&nbsp;\u20ac), cela permettra \u00e0 tous les Japonais ayant loup\u00e9 l'<strong>exploit<\/strong> <em>Patapon 2<\/em> d'avoir une seconde chance pour se rattraper. Et en plus de pouvoir profiter d'un jeu vraiment cool&#8239;! 8D<\/p>\n<div align=\"center\">\n<blockquote class=\"twitter-tweet\" lang=\"fr\">\n[ANNOUNCE] Hurry up! The new exploited game is below: \u521d\u97f3\u30df\u30af -Project DIVA- extend | \u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30ab\u30bf\u30ed\u30b0 | \u30d7\u30ec\u30a4\u30b9\u30c6\u30fc\u30b7\u30e7\u30f3\u00ae \u30aa\u30d5\u30a3\u30b7\u30e3\u30eb\u30b5\u30a4\u30c8 <a href=\"http:\/\/t.co\/fqycFxwoNz\">http:\/\/t.co\/fqycFxwoNz<\/a><\/p>\n<p>\u2014 173210 in English (@173210_en) <a href=\"https:\/\/twitter.com\/173210_en\/status\/561142941272391680\">30 Janvier 2015<\/a><\/p>\n<\/blockquote>\n<p>\n<script src=\"\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script>\n<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\">\u00a0Pour le moment, seul un <em>Binary Loader<\/em> a \u00e9t\u00e9 publi\u00e9...<\/p>\n<p>&nbsp;<\/p>\n<div align=\"center\"><\/p>\n<blockquote class=\"twitter-tweet\" lang=\"fr\">\n<p>Binary Loader for miku_extend <a href=\"https:\/\/t.co\/fL72UspFuF\">https:\/\/t.co\/fL72UspFuF<\/a> Well... I forgot how to execute it. I think it's a function like play record.<\/p>\n<p>\u2014 173210 in English (@173210_en) <a href=\"https:\/\/twitter.com\/173210_en\/status\/561160495986536448\">30 Janvier 2015<\/a><\/p>\n<p>&nbsp;<\/p>\n<\/blockquote>\n<p>\n<script src=\"\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script>\n<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Et uniquement pour les comptes japonais poss\u00e9dant une PS Vita en firmware 3.36.<\/p>\n","protected":false},"author":481,"featured_media":2258,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,29,71,30],"tags":[1187],"plateformes":[854],"genres":[1161,872,873,952],"developpeurs":[1186],"editeurs":[],"types":[859,864],"sources":[1188],"class_list":["post-2256","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-news-underground","category-outils","category-underground","tag-hatsune-miku-project-diva-extend","plateformes-ps-vita","genres-exploit-epsp","genres-exploits","genres-exploits-kernel","genres-exploits-vita","developpeurs-1186","types-hack-vita","types-news","sources-httphackinformer-com20150130173210-announces-a-new-jp-exploit-game-for-the-psvita"],"yoast_head":"\n<title>Nouvel exploit pour les comptes Japonais ! - Custom Protocol<\/title>\n<meta name=\"description\" content=\"Et uniquement pour les comptes japonais poss\u00e9dant une PS Vita en firmware 3.36.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.customprotocol.com\/173210-annonce-un-nouvel-exploit-pour-les-comptes-jp\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nouvel exploit pour les comptes Japonais ! - Custom Protocol\" \/>\n<meta property=\"og:description\" content=\"Et uniquement pour les comptes japonais poss\u00e9dant une PS Vita en firmware 3.36.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.customprotocol.com\/173210-annonce-un-nouvel-exploit-pour-les-comptes-jp\/\" \/>\n<meta property=\"og:site_name\" content=\"Custom Protocol\" \/>\n<meta property=\"article:published_time\" content=\"2015-02-01T13:11:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.customprotocol.com\/medias\/2015\/02\/exploit-vignette.png\" \/>\n\t<meta property=\"og:image:width\" content=\"450\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Wirus\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/HackerGen\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wirus\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimation du temps de lecture\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.customprotocol.com\/173210-annonce-un-nouvel-exploit-pour-les-comptes-jp\/\",\"url\":\"https:\/\/www.customprotocol.com\/173210-annonce-un-nouvel-exploit-pour-les-comptes-jp\/\",\"name\":\"Nouvel exploit pour les comptes Japonais ! - Custom Protocol\",\"isPartOf\":{\"@id\":\"https:\/\/www.customprotocol.com\/#website\"},\"datePublished\":\"2015-02-01T13:11:47+00:00\",\"dateModified\":\"2015-02-01T13:11:47+00:00\",\"author\":{\"@id\":\"https:\/\/www.customprotocol.com\/#\/schema\/person\/e2f5c3e6cbb948e59756b98bed512cf9\"},\"description\":\"Et uniquement pour les comptes japonais poss\u00e9dant une PS Vita en firmware 3.36.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.customprotocol.com\/173210-annonce-un-nouvel-exploit-pour-les-comptes-jp\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.customprotocol.com\/173210-annonce-un-nouvel-exploit-pour-les-comptes-jp\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.customprotocol.com\/173210-annonce-un-nouvel-exploit-pour-les-comptes-jp\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.customprotocol.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"[Vita] 173210 annonce un nouvel exploit pour les comptes JP\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.customprotocol.com\/#website\",\"url\":\"https:\/\/www.customprotocol.com\/\",\"name\":\"Custom Protocol\",\"description\":\"Site d&#039;hack-tualit\u00e9 et de tutoriels sur la customisation de consoles et appareils (homebrews, plugins, \u00e9mulation...)\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.customprotocol.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.customprotocol.com\/#\/schema\/person\/e2f5c3e6cbb948e59756b98bed512cf9\",\"name\":\"Wirus\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/www.customprotocol.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ff65bb0fba0be9639885c04a3ed7d8a895a98260fc23f283286dc9cf20bf3871?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ff65bb0fba0be9639885c04a3ed7d8a895a98260fc23f283286dc9cf20bf3871?s=96&d=mm&r=g\",\"caption\":\"Wirus\"},\"description\":\"Avez-vous d\u00e9j\u00e0 vu un gentil virus ? Maintenant, oui.\",\"sameAs\":[\"https:\/\/hackergen.com\",\"https:\/\/twitter.com\/https:\/\/twitter.com\/HackerGen\",\"https:\/\/www.youtube.com\/user\/Wirusalization\"],\"url\":\"https:\/\/www.customprotocol.com\/auteur\/wirus\/\"}]}<\/script>\n","yoast_head_json":{"title":"Nouvel exploit pour les comptes Japonais ! - Custom Protocol","description":"Et uniquement pour les comptes japonais poss\u00e9dant une PS Vita en firmware 3.36.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.customprotocol.com\/173210-annonce-un-nouvel-exploit-pour-les-comptes-jp\/","og_locale":"fr_CA","og_type":"article","og_title":"Nouvel exploit pour les comptes Japonais ! - Custom Protocol","og_description":"Et uniquement pour les comptes japonais poss\u00e9dant une PS Vita en firmware 3.36.","og_url":"https:\/\/www.customprotocol.com\/173210-annonce-un-nouvel-exploit-pour-les-comptes-jp\/","og_site_name":"Custom Protocol","article_published_time":"2015-02-01T13:11:47+00:00","og_image":[{"width":450,"height":300,"url":"https:\/\/www.customprotocol.com\/medias\/2015\/02\/exploit-vignette.png","type":"image\/png"}],"author":"Wirus","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/HackerGen","twitter_misc":{"\u00c9crit par":"Wirus","Estimation du temps de lecture":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.customprotocol.com\/173210-annonce-un-nouvel-exploit-pour-les-comptes-jp\/","url":"https:\/\/www.customprotocol.com\/173210-annonce-un-nouvel-exploit-pour-les-comptes-jp\/","name":"Nouvel exploit pour les comptes Japonais ! - Custom Protocol","isPartOf":{"@id":"https:\/\/www.customprotocol.com\/#website"},"datePublished":"2015-02-01T13:11:47+00:00","dateModified":"2015-02-01T13:11:47+00:00","author":{"@id":"https:\/\/www.customprotocol.com\/#\/schema\/person\/e2f5c3e6cbb948e59756b98bed512cf9"},"description":"Et uniquement pour les comptes japonais poss\u00e9dant une PS Vita en firmware 3.36.","breadcrumb":{"@id":"https:\/\/www.customprotocol.com\/173210-annonce-un-nouvel-exploit-pour-les-comptes-jp\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.customprotocol.com\/173210-annonce-un-nouvel-exploit-pour-les-comptes-jp\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.customprotocol.com\/173210-annonce-un-nouvel-exploit-pour-les-comptes-jp\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.customprotocol.com\/"},{"@type":"ListItem","position":2,"name":"[Vita] 173210 annonce un nouvel exploit pour les comptes JP"}]},{"@type":"WebSite","@id":"https:\/\/www.customprotocol.com\/#website","url":"https:\/\/www.customprotocol.com\/","name":"Custom Protocol","description":"Site d&#039;hack-tualit\u00e9 et de tutoriels sur la customisation de consoles et appareils (homebrews, plugins, \u00e9mulation...)","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.customprotocol.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-CA"},{"@type":"Person","@id":"https:\/\/www.customprotocol.com\/#\/schema\/person\/e2f5c3e6cbb948e59756b98bed512cf9","name":"Wirus","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.customprotocol.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ff65bb0fba0be9639885c04a3ed7d8a895a98260fc23f283286dc9cf20bf3871?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ff65bb0fba0be9639885c04a3ed7d8a895a98260fc23f283286dc9cf20bf3871?s=96&d=mm&r=g","caption":"Wirus"},"description":"Avez-vous d\u00e9j\u00e0 vu un gentil virus ? Maintenant, oui.","sameAs":["https:\/\/hackergen.com","https:\/\/twitter.com\/https:\/\/twitter.com\/HackerGen","https:\/\/www.youtube.com\/user\/Wirusalization"],"url":"https:\/\/www.customprotocol.com\/auteur\/wirus\/"}]}},"_links":{"self":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/posts\/2256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/users\/481"}],"replies":[{"embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/comments?post=2256"}],"version-history":[{"count":0,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/posts\/2256\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/media\/2258"}],"wp:attachment":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/media?parent=2256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/categories?post=2256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/tags?post=2256"},{"taxonomy":"plateformes","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/plateformes?post=2256"},{"taxonomy":"genres","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/genres?post=2256"},{"taxonomy":"developpeurs","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/developpeurs?post=2256"},{"taxonomy":"editeurs","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/editeurs?post=2256"},{"taxonomy":"types","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/types?post=2256"},{"taxonomy":"sources","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/sources?post=2256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}