{"id":6067,"date":"2015-08-14T15:43:13","date_gmt":"2015-08-14T13:43:13","guid":{"rendered":"https:\/\/www.customprotocol.com\/?p=6067"},"modified":"2015-08-14T15:43:13","modified_gmt":"2015-08-14T13:43:13","slug":"vitapstv-exploit-epsp-refait-surface","status":"publish","type":"post","link":"https:\/\/www.customprotocol.com\/vitapstv-exploit-epsp-refait-surface\/","title":{"rendered":"[Vita] [PSTV] Un exploit ePSP refait surface&#8239;!"},"content":{"rendered":"<p><a style=\"text-align: justify;\" href=\"https:\/\/www.customprotocol.com\/underground\/encore-un-nouvel-exploit-trouve-en-3-50\/\">En avril<\/a>, le d\u00e9veloppeur <em>Patchouli<\/em> \u00e9paul\u00e9 du c\u00e9l\u00e8bre hackeur\u00a0<em>173210\u00a0<\/em>pr\u00e9sentait un <strong>exploit<\/strong> prometteur disponible sur le <em>Store<\/em> japonais, tournant en 3.50 et permettant de lancer le <em>VHBL<\/em>.\u00a0Nous n'avions cependant plus de nouvelle de cet <strong>exploit<\/strong> jusqu'\u00e0... aujourd'hui.<\/p>\n<figure id=\"attachment_2253\" aria-describedby=\"caption-attachment-2253\" style=\"width: 764px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.customprotocol.com\/medias\/2015\/02\/VHBLVignette.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-2253\" src=\"https:\/\/www.customprotocol.com\/medias\/2015\/02\/VHBLVignette-1024x576.png\" alt=\"Le VHBL sera ex\u00e9cutable en 3.50 et inf\u00e9rieurs pour ceux qui auraient loup\u00e9 le dernier exploit\" width=\"764\" height=\"430\" srcset=\"https:\/\/www.customprotocol.com\/medias\/2015\/02\/VHBLVignette-1024x576.png 1024w, https:\/\/www.customprotocol.com\/medias\/2015\/02\/VHBLVignette-300x169.png 300w, https:\/\/www.customprotocol.com\/medias\/2015\/02\/VHBLVignette-768x432.png 768w, https:\/\/www.customprotocol.com\/medias\/2015\/02\/VHBLVignette-370x208.png 370w, https:\/\/www.customprotocol.com\/medias\/2015\/02\/VHBLVignette-270x152.png 270w, https:\/\/www.customprotocol.com\/medias\/2015\/02\/VHBLVignette-570x321.png 570w, https:\/\/www.customprotocol.com\/medias\/2015\/02\/VHBLVignette-740x416.png 740w, https:\/\/www.customprotocol.com\/medias\/2015\/02\/VHBLVignette.png 1920w, https:\/\/www.customprotocol.com\/medias\/2015\/02\/VHBLVignette-300x169@2x.png 600w, https:\/\/www.customprotocol.com\/medias\/2015\/02\/VHBLVignette-768x432@2x.png 1536w\" sizes=\"auto, (max-width: 764px) 100vw, 764px\" \/><\/a><figcaption id=\"caption-attachment-2253\" class=\"wp-caption-text\">Le <strong>VHBL<\/strong> fonctionne sur cet <strong>exploit<\/strong> en 3.52.<\/figcaption><\/figure>\n<p style=\"text-align: justify;\">En effet, les deux japonais reviennent sur cet <em>exploit<\/em> avec de nouvelles informations tr\u00e8s int\u00e9ressantes&#8239;! Tout d'abord, le jeu exploit\u00e9 tourne sur la derni\u00e8re version de la console portable de <em>Sony<\/em>, mais le mieux, c'est qu'on en apprend plus sur la nature de l'<strong>exploit<\/strong>, et l s'agirait d'<a href=\"https:\/\/www.customprotocol.com\/underground\/quest-ce-quun-exploit-dans-le-milieu-du-hack\/\">un <em>exploit kernel<\/em><\/a>&#8239;! Ce qui signifie qu'on\u00a0pourra donc faire tourner le <strong>VHBL<\/strong> mais \u00e9galement l'<strong>ARK-2<\/strong>\u00a0ou\u00a0le <strong>TN-V<\/strong>,\u00a0bref\u00a0profiter des\u00a0<em>homebrews <\/em>mais \u00e9galement<em>\u00a0<\/em>des\u00a0<em>back-ups<\/em>\u00a0(<em>ISO<\/em>\/<em>CSO<\/em>), des jeux\u00a0<em>PS One<\/em>, des\u00a0<em>plugins<\/em>\u2026 Pour soutenir ces propos, le hackeur <em>Patchouli<\/em> a publi\u00e9 une vid\u00e9o montrant clairement une PS Vita\u00a0en 3.52 et affichant un joli \"Hello World\" via l'utilisation de cet <strong>exploit<\/strong>.<\/p>\n<div class=\"inserervideo\"><iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/VbmQb8nrrPY\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/div>\n<p style=\"text-align: justify;\">Bref, c'est une bonne nouvelle pour ceux qui sont (malheureusement) pass\u00e9 en 3.52 (et ne pouvant pas\u00a0profiter de l'<a href=\"https:\/\/www.customprotocol.com\/underground\/vita-rejuvenate-la-plateforme-des-homebrews-natifs-ps-vita\/\">exploit PSM<\/a>). Sachez que l'<strong>exploit<\/strong>\u00a0fonctionne sur un jeu japonais, donc il vous faudra obligatoirement un compte sur le <em>store<\/em> japonais pour pouvoir t\u00e9l\u00e9charger le jeu. Toujours pas d'information sur la compatibilit\u00e9 avec les autres versions disponibles sur les autres magasins en ligne de <em>Sony<\/em>.\u00a0Quant au\u00a0nom de ce fameux titre,\u00a0on attend toujours...<\/p>\n","protected":false},"excerpt":{"rendered":"<p>En plus il tourne en 3.52 et est de type kernel&#8239;!<\/p>\n","protected":false},"author":22,"featured_media":6071,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,29,30],"tags":[33],"plateformes":[917,854],"genres":[1178,1193,872,873,1122,1443,1158],"developpeurs":[1186,1381],"editeurs":[1281,1380],"types":[914,859],"sources":[1688],"class_list":["post-6067","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-news-underground","category-underground","tag-videos","plateformes-ps-tv","plateformes-ps-vita","genres-ark2","genres-ecfw","genres-exploits","genres-exploits-kernel","genres-hello-world","genres-tn-v-ecfw","genres-vhbl","developpeurs-1186","developpeurs-patchouli","editeurs-1281","editeurs-patchouli","types-hack-ps-tv","types-hack-vita","sources-httpgamegaz-com2015081316560"],"yoast_head":"\n<title>[Vita] [PSTV] Un exploit ePSP refait surface ! - Custom Protocol<\/title>\n<meta name=\"description\" content=\"En plus il tourne en 3.52 et est de type kernel !\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.customprotocol.com\/vitapstv-exploit-epsp-refait-surface\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"[Vita] [PSTV] Un exploit ePSP refait surface ! - Custom Protocol\" \/>\n<meta property=\"og:description\" content=\"En plus il tourne en 3.52 et est de type kernel !\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.customprotocol.com\/vitapstv-exploit-epsp-refait-surface\/\" \/>\n<meta property=\"og:site_name\" content=\"Custom Protocol\" \/>\n<meta property=\"article:published_time\" content=\"2015-08-14T13:43:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.customprotocol.com\/medias\/2015\/08\/PSVita-hack.png\" \/>\n\t<meta property=\"og:image:width\" content=\"510\" \/>\n\t<meta property=\"og:image:height\" content=\"382\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Applelo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Applelo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimation du temps de lecture\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.customprotocol.com\/vitapstv-exploit-epsp-refait-surface\/\",\"url\":\"https:\/\/www.customprotocol.com\/vitapstv-exploit-epsp-refait-surface\/\",\"name\":\"[Vita] [PSTV] Un exploit ePSP refait surface ! - Custom Protocol\",\"isPartOf\":{\"@id\":\"https:\/\/www.customprotocol.com\/#website\"},\"datePublished\":\"2015-08-14T13:43:13+00:00\",\"dateModified\":\"2015-08-14T13:43:13+00:00\",\"author\":{\"@id\":\"https:\/\/www.customprotocol.com\/#\/schema\/person\/c04feffaa032ea9cbc1d8a44891856c1\"},\"description\":\"En plus il tourne en 3.52 et est de type kernel !\",\"breadcrumb\":{\"@id\":\"https:\/\/www.customprotocol.com\/vitapstv-exploit-epsp-refait-surface\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.customprotocol.com\/vitapstv-exploit-epsp-refait-surface\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.customprotocol.com\/vitapstv-exploit-epsp-refait-surface\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.customprotocol.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"[Vita] [PSTV] Un exploit ePSP refait surface&#8239;!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.customprotocol.com\/#website\",\"url\":\"https:\/\/www.customprotocol.com\/\",\"name\":\"Custom Protocol\",\"description\":\"Site d&#039;hack-tualit\u00e9 et de tutoriels sur la customisation de consoles et appareils (homebrews, plugins, \u00e9mulation...)\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.customprotocol.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.customprotocol.com\/#\/schema\/person\/c04feffaa032ea9cbc1d8a44891856c1\",\"name\":\"Applelo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/www.customprotocol.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/30c749815d89a5f369968bbaea5d147faede954aa74b1b50937f44318a8fcd55?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/30c749815d89a5f369968bbaea5d147faede954aa74b1b50937f44318a8fcd55?s=96&d=mm&r=g\",\"caption\":\"Applelo\"},\"url\":\"https:\/\/www.customprotocol.com\/auteur\/applelo1\/\"}]}<\/script>\n","yoast_head_json":{"title":"[Vita] [PSTV] Un exploit ePSP refait surface ! - Custom Protocol","description":"En plus il tourne en 3.52 et est de type kernel !","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.customprotocol.com\/vitapstv-exploit-epsp-refait-surface\/","og_locale":"fr_CA","og_type":"article","og_title":"[Vita] [PSTV] Un exploit ePSP refait surface ! - Custom Protocol","og_description":"En plus il tourne en 3.52 et est de type kernel !","og_url":"https:\/\/www.customprotocol.com\/vitapstv-exploit-epsp-refait-surface\/","og_site_name":"Custom Protocol","article_published_time":"2015-08-14T13:43:13+00:00","og_image":[{"width":510,"height":382,"url":"https:\/\/www.customprotocol.com\/medias\/2015\/08\/PSVita-hack.png","type":"image\/png"}],"author":"Applelo","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Applelo","Estimation du temps de lecture":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.customprotocol.com\/vitapstv-exploit-epsp-refait-surface\/","url":"https:\/\/www.customprotocol.com\/vitapstv-exploit-epsp-refait-surface\/","name":"[Vita] [PSTV] Un exploit ePSP refait surface ! - Custom Protocol","isPartOf":{"@id":"https:\/\/www.customprotocol.com\/#website"},"datePublished":"2015-08-14T13:43:13+00:00","dateModified":"2015-08-14T13:43:13+00:00","author":{"@id":"https:\/\/www.customprotocol.com\/#\/schema\/person\/c04feffaa032ea9cbc1d8a44891856c1"},"description":"En plus il tourne en 3.52 et est de type kernel !","breadcrumb":{"@id":"https:\/\/www.customprotocol.com\/vitapstv-exploit-epsp-refait-surface\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.customprotocol.com\/vitapstv-exploit-epsp-refait-surface\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.customprotocol.com\/vitapstv-exploit-epsp-refait-surface\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.customprotocol.com\/"},{"@type":"ListItem","position":2,"name":"[Vita] [PSTV] Un exploit ePSP refait surface&#8239;!"}]},{"@type":"WebSite","@id":"https:\/\/www.customprotocol.com\/#website","url":"https:\/\/www.customprotocol.com\/","name":"Custom Protocol","description":"Site d&#039;hack-tualit\u00e9 et de tutoriels sur la customisation de consoles et appareils (homebrews, plugins, \u00e9mulation...)","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.customprotocol.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-CA"},{"@type":"Person","@id":"https:\/\/www.customprotocol.com\/#\/schema\/person\/c04feffaa032ea9cbc1d8a44891856c1","name":"Applelo","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.customprotocol.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/30c749815d89a5f369968bbaea5d147faede954aa74b1b50937f44318a8fcd55?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/30c749815d89a5f369968bbaea5d147faede954aa74b1b50937f44318a8fcd55?s=96&d=mm&r=g","caption":"Applelo"},"url":"https:\/\/www.customprotocol.com\/auteur\/applelo1\/"}]}},"_links":{"self":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/posts\/6067","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/comments?post=6067"}],"version-history":[{"count":0,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/posts\/6067\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/media\/6071"}],"wp:attachment":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/media?parent=6067"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/categories?post=6067"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/tags?post=6067"},{"taxonomy":"plateformes","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/plateformes?post=6067"},{"taxonomy":"genres","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/genres?post=6067"},{"taxonomy":"developpeurs","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/developpeurs?post=6067"},{"taxonomy":"editeurs","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/editeurs?post=6067"},{"taxonomy":"types","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/types?post=6067"},{"taxonomy":"sources","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/sources?post=6067"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}