{"id":7943,"date":"2015-12-16T10:30:45","date_gmt":"2015-12-16T09:30:45","guid":{"rendered":"https:\/\/www.customprotocol.com\/?p=7943"},"modified":"2015-12-16T10:30:45","modified_gmt":"2015-12-16T09:30:45","slug":"ps4-hack-ps4-rendu-possible-grace-ram-dump","status":"publish","type":"post","link":"https:\/\/www.customprotocol.com\/ps4-hack-ps4-rendu-possible-grace-ram-dump\/","title":{"rendered":"[PS4] Le hack PS4 rendu possible gr\u00e2ce \u00e0 un RAM Dump (CTurt)"},"content":{"rendered":"<p style=\"text-align: justify;\">Apr\u00e8s une <a href=\"https:\/\/www.customprotocol.com\/underground\/un-exploit-kernel-annonce-sur-ps4\/\" target=\"_blank\" rel=\"noopener noreferrer\">annonce choc d'un <em>exploit kernel<\/em> sur PS4<\/a>, le d\u00e9veloppeur <em>CTurt<\/em> vient de faire de nouveaux progr\u00e8s en faveur d'un <strong>hack PS4<\/strong> futur. Ainsi, il a r\u00e9cemment affirm\u00e9 avoir r\u00e9ussi \u00e0 <strong>dumper la RAM<\/strong>, rien que \u00e7a. Prochaine \u00e9tape&#8239;? La <em>patcher<\/em>. En d'autres mots, faire en sorte que la PS4 effectue des actions qu'elle n'est pas cens\u00e9e faire de base, ce qui constituerait la premi\u00e8re vraie et importante \u00e9tape vers le <strong>hack<\/strong> de la console.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.customprotocol.com\/medias\/2015\/12\/ps4-fond-bleu-joli-joli-hack-tete-de-mort-skull.png\" rel=\"attachment wp-att-7968\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-7968\" src=\"https:\/\/www.customprotocol.com\/medias\/2015\/12\/ps4-fond-bleu-joli-joli-hack-tete-de-mort-skull-500x281.png\" alt=\"ps4 fond bleu joli joli hack tete de mort skull\" width=\"500\" height=\"281\" \/><\/a><\/p>\n<hr \/>\n<p style=\"text-align: justify;\"><em>Cturt<\/em> a r\u00e9cemment confirm\u00e9 sur <em>Twitter<\/em> qu'il \u00e9tait d\u00e9j\u00e0 capable de <strong>dumper la RAM<\/strong> de la PS4 via l'<em>exploit kernel<\/em> en sa possession. La suite logique serait donc qu'il puisse modifier s\u00e9lectivement la <em>RAM<\/em> lors de l'ex\u00e9cution afin de faire r\u00e9aliser \u00e0 la console ce qu'elle ne veut pas faire. De l\u00e0, un <strong>SDK<\/strong> et un <strong>homebrew loader<\/strong>, ou un <strong>Custom Firmware<\/strong> pour la PS4 pourrai(en)t \u00eatre cr\u00e9e(s).<\/p>\n<p style=\"text-align: justify;\">Par ailleurs, le codeur a promis qu'il \u00e9crirait des explications techniques de la fa\u00e7on dont sont <em>exploit<\/em> fonctionne prochainement.<\/p>\n<div align=\"center\">\n<blockquote class=\"twitter-tweet\" lang=\"fr\">\n<p dir=\"ltr\" lang=\"en\">Can successfully dump RAM from other processes (like SceShellUI) using ptrace! Next step: patching RAM...<\/p>\n<p>\u2014 CTurt (@CTurtE) <a href=\"https:\/\/twitter.com\/CTurtE\/status\/675762173583454209\">12 D\u00e9cembre 2015<\/a><\/p><\/blockquote>\n<p><script src=\"\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/div>\n<h4 style=\"text-align: justify;\"><span style=\"text-decoration: underline;\"><strong>Vers un hack pour PS4... en firmware 1.76&#8239;?<\/strong><\/span><\/h4>\n<p style=\"text-align: justify;\">Le <strong>hack<\/strong> a d\u00e9j\u00e0 \u00e9t\u00e9 confirm\u00e9 par de nombreux autres <em>hackers<\/em> de la sc\u00e8ne <em>underground PlayStation<\/em>. Ne vous excitez cependant pas trop vite&nbsp;: premi\u00e8rement, ce genre de choses prend beaucoup de temps (de multiples mois)&#8239;; secondement, il ne devrait \u00eatre accessible que par les PlayStation 4 en <em>firmware<\/em> 1.76 ou inf\u00e9rieur... Eh oui...<\/p>\n<p style=\"text-align: justify;\">Vous vous en souvenez peut-\u00eatre, mais <a href=\"https:\/\/www.customprotocol.com\/underground\/ps4-le-point-sur-le-hack-de-la-playstation-4\/\" target=\"_blank\" rel=\"noopener noreferrer\">c'est sur le <em>firmware <\/em>1.76 que les <em>hackers<\/em> avaient trouv\u00e9 la faille <em>WebKit<\/em><\/a>. Ce qui signifie que si vous avez une PS4 \u00e0 jour (3.11), vous ne pourrez tout simplement pas profiter du <strong>hack<\/strong> actuellement en cours de r\u00e9alisation par <em>CTurt<\/em>. Attention, cela ne veut pas dire que ce <em>jailbreak<\/em> ne sera disponible que pour une petite poign\u00e9e de gens, il permettra surtout aux devs d'en savoir plus quant au fonctionnement interne de la console de <em>Sony<\/em>.<\/p>\n<p style=\"text-align: justify;\">De cette mani\u00e8re, ils pourront analyser le syst\u00e8me enti\u00e8rement, et s\u00fbrement trouver beaucoup d'autres vuln\u00e9rabilit\u00e9s rest\u00e9es intactes en 3.11. Cela dit, il semblerait que certaines personnes se sont d\u00e9j\u00e0 lanc\u00e9s \u00e0 la recherche de <em>bundles<\/em> de PS4 en 1.76 en Am\u00e9rique du Nord.<\/p>\n<p><a href=\"https:\/\/www.customprotocol.com\/medias\/2015\/08\/execution-code-non-signe-ps4-exploit-webkit-c-turt.png\" rel=\"attachment wp-att-6283\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-6283 aligncenter\" src=\"https:\/\/www.customprotocol.com\/medias\/2015\/08\/execution-code-non-signe-ps4-exploit-webkit-c-turt-500x274.png\" alt=\"execution code non sign\u00e9 ps4 exploit webkit c turt\" width=\"500\" height=\"274\" \/><\/a><\/p>\n<h4 style=\"text-align: justify;\"><span style=\"text-decoration: underline;\"><strong>Piraterie et sp\u00e9culations<\/strong><\/span><\/h4>\n<p style=\"text-align: justify;\">Si vous \u00eates possesseur d'une PS4, vous \u00eates tr\u00e8s certainement impatient \u00e0 l'id\u00e9e d'avoir une console <strong>hack\u00e9e<\/strong>. L'obtention d'un acc\u00e8s au noyau (<em>kernel<\/em>) sous-entend g\u00e9n\u00e9ralement que les verrous anti-piratage de l'appareil peuvent \u00eatre facilement bris\u00e9s, mais rien n'a \u00e9t\u00e9 confirm\u00e9 \u00e0 ce sujet. Les personnes qui enfreignent d'ailleurs la s\u00e9curit\u00e9 initialement ne sont pas forc\u00e9ment ceux qui lancent la piraterie sur l'appareil. Bref, tout reste tr\u00e8s incertain l\u00e0-dessus, tant mieux ou tant pis selon vos envies.<\/p>\n<p style=\"text-align: justify;\"><strong>Faites attention<\/strong> aux nombreuses sp\u00e9culations et <em>fakes<\/em> pr\u00e9sents un peu partout sur le <em>Net<\/em>. En g\u00e9n\u00e9ral, le grand public, qui ne va pas aller s'informer sur <strong>Custom Protocol<\/strong> (bouh les vilains&nbsp;:P), n'ont aucune id\u00e9e de la r\u00e9elle avanc\u00e9e du <strong>hack PS4<\/strong>, et peuvent tr\u00e8s facilement tomber dans des pi\u00e8ges en apparence tr\u00e8s all\u00e9chants et s\u00e9rieux. \u00c9vitez donc tous les sites qui vous assurent d'avoir des <strong>PS4 hack\u00e9es<\/strong> en leur possession, ou bien un <strong>hack pour PS4<\/strong> tout simplement&nbsp;: ils ne cherchent qu'\u00e0 vous soutirer de l'argent pour une grosse arnaque. Si un <strong>hack PS4<\/strong> \u00e9tait mis en ligne un jour, <strong>Custom Protocol<\/strong> vous chargera de vous en informer le plus rapidement et en d\u00e9tails possible.&nbsp;\ud83d\ude42<\/p>\n<figure id=\"attachment_7842\" aria-describedby=\"caption-attachment-7842\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.customprotocol.com\/medias\/2015\/12\/ps4_apu.jpg\" rel=\"attachment wp-att-7842\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-7842\" src=\"https:\/\/www.customprotocol.com\/medias\/2015\/12\/ps4_apu-500x500.jpg\" alt=\"L'int\u00e9rieur de la PS4...\" width=\"500\" height=\"500\" \/><\/a><figcaption id=\"caption-attachment-7842\" class=\"wp-caption-text\">L'int\u00e9rieur de la PS4...<\/figcaption><\/figure>\n<h4 style=\"text-align: justify;\"><span style=\"text-decoration: underline;\"><strong>Du teasing qui montre la racine des fichiers syst\u00e8me<\/strong><\/span><\/h4>\n<p style=\"text-align: justify;\"><em>CTurt<\/em> a souhait\u00e9 <em>teaser<\/em> quelque peu ses prouesses via un <em>dump<\/em> des fichiers syt\u00e8me \u00e0 la racine ainsi que le processus ex\u00e9cut\u00e9 dans la <em>RAM<\/em>. En ce qui concerne le <em>filesystem<\/em>, on peut percevoir des similitudes avec une installation standard de <em>FreeBSD<\/em>, avec des r\u00e9pertoires tels que \"\/dev\" ou \"\/mnt.\"<\/p>\n<p style=\"text-align: justify;\">Les fichiers un peu plus sp\u00e9cifiques \u00e0 la PS4 sont facilement discernables, tels que <em>SceBootSplash.elf<\/em> et <em>SceSysAvControl.elf<\/em>. Les fichiers <em>ELF<\/em> sont pour rappel des ex\u00e9cutables (un peu \u00e0 l'instar des <em>PBP<\/em>), et il est certain que tous ces fichiers doivent \u00eatre crypt\u00e9s, mais il serait tr\u00e8s int\u00e9ressant de voir comment ils pourraient \u00eatre remplac\u00e9s. Enfin, vu le niveau actuel du <strong>hack<\/strong>, ce serait plut\u00f4t une mauvaise id\u00e9e puisque ces fichiers doivent \u00eatre essentiels au d\u00e9marrage de la console. Et \u00e9tant donn\u00e9 que l'on ne sait pas encore <em>d\u00e9bricker<\/em> une PS4, \u00e7a serait con...&nbsp;:3<\/p>\n<p style=\"text-align: justify;\">On peut noter enfin la pr\u00e9sence d'un dossier \"update\", qui doit contenir les informations relatives aux mises \u00e0 jour (merci <em>Captain Obvious<\/em>), et d\u00e9j\u00e0 existant sur les PSP et les PS3.<\/p>\n<pre class=\"lang:default decode:true\">[+] Entered shellcode\n  [+] UID: 0, GID: 0\n[DIR]: .\n[DIR]: ..\n[DIR]: adm\n[DIR]: app_tmp\n[DIR]: data\n[DIR]: dev\n[DIR]: eap_user\n[DIR]: eap_vsh\n[DIR]: hdd\n[DIR]: host\n[DIR]: hostapp\n[FILE]: mini-syscore.elf\n[DIR]: mnt\n[DIR]: preinst\n[DIR]: preinst2\n[FILE]: safemode.elf\n[FILE]: SceBootSplash.elf\n[FILE]: SceSysAvControl.elf\n[DIR]: system\n[DIR]: system_data\n[DIR]: system_ex\n[DIR]: system_tmp\n[DIR]: update\n[DIR]: usb\n[DIR]: user<\/pre>\n<p style=\"text-align: justify;\">Le processus quant \u00e0 lui est un gros m\u00e9lange de choses et d'autres processus de la PS4. Tous ceux sp\u00e9cifiques \u00e0 la PlayStation 4 commencent par l'annotation \"Sce\" ou bien \"orbis_\" (le nom de code du d\u00e9veloppement PS4).<\/p>\n<pre class=\"lang:default decode:true\">  [+] PID 0, name: kernel, thread: mca taskq\n  [+] PID 1, name: mini-syscore.elf, thread: SceRegSyncer\n  [+] PID 2, name: SceHidAuth, thread: SceHidAuth\n  [+] PID 3, name: hidMain, thread: hidMain\n  [+] PID 4, name: SceCameraDriverMain, thread: SceCameraDriverM\n  [+] PID 5, name: SceCameraSdma, thread: SceCameraSdma\n  [+] PID 6, name: hdmiEvent, thread: hdmiEvent\n  [+] PID 8, name: xpt_thrd, thread: xpt_thrd\n  [+] PID 9, name: iccnvs, thread: iccnvs\n  [+] PID 10, name: audit, thread: audit\n  [+] PID 11, name: idle, thread: idle: cpu0\n  [+] PID 12, name: intr, thread: irq273: xhci2\n  [+] PID 13, name: geom, thread: g_notification\n  [+] PID 14, name: yarrow, thread: yarrow\n  [+] PID 15, name: usb, thread: usbus2\n  [+] PID 16, name: md0, thread: md0\n  [+] PID 17, name: icc_thermal, thread: icc_thermal\n  [+] PID 18, name: sflash, thread: sflash\n  [+] PID 19, name: sbram, thread: sbram\n  [+] PID 20, name: trsw intr, thread: trsw intr\n  [+] PID 21, name: trsw ctrl, thread: trsw ctrl\n  [+] PID 22, name: SceBtDriver, thread: SceBtDriver\n  [+] PID 23, name: pagedaemon0, thread: pagedaemon0\n  [+] PID 24, name: pagedaemon1, thread: pagedaemon1\n  [+] PID 25, name: vmdaemon, thread: vmdaemon\n  [+] PID 26, name: bufdaemon, thread: bufdaemon\n  [+] PID 27, name: syncer, thread: syncer\n  [+] PID 28, name: vnlru, thread: vnlru\n  [+] PID 29, name: softdepflush, thread: softdepflush\n  [+] PID 31, name: SceSysAvControl.elf, thread: SceAvSettingPoll\n  [+] PID 33, name: SceSysCore.elf, thread: SysCoreAppmgrWat\n  [+] PID 34, name: orbis_audiod.elf, thread: AoutMonitorPid40\n  [+] PID 35, name: GnmCompositor.elf, thread: CameraThread\n  [+] PID 36, name: SceShellCore, thread: SceMsgMwSendMana\n  [+] PID 38, name: SceShellUI, thread: SceWebReceiveQue\n  [+] PID 39, name: MonoCompiler.elf, thread: MonoCompiler.elf\n  [+] PID 40, name: SceAvCapture, thread: SceAvCaptureIpc\n  [+] PID 41, name: SceGameLiveStreamin, thread: SceGlsStrmJobQue\n  [+] PID 42, name: ScePartyDaemon, thread: SceMbusEventPoll\n  [+] PID 43, name: SceVideoCoreServer, thread: SceVideoCoreServ\n  [+] PID 44, name: SceRemotePlay, thread: SceRp-Httpd\n  [+] PID 45, name: SceCloudClientDaemo, thread: SceCloudClientDa\n  [+] PID 46, name: SceVdecProxy.elf, thread: proxy_ipmi_serve\n  [+] PID 47, name: SceVencProxy.elf, thread: SceVencProxyIpmi\n  [+] PID 48, name: fs_cleaner.elf, thread: fs_cleaner.elf\n  [+] PID 49, name: SceSpkService, thread: SceSpkService\n  [+] PID 50, name: WebProcess.self, thread: selectThread\n  [+] PID 51, name: orbis-jsc-compiler., thread: SceFastMalloc\n  [+] Triggering second kernel payload\n  [+] Entered main payload<\/pre>\n<p style=\"text-align: justify;\">Rien d'exceptionnel pour l'instant, puisque tout ce que l'on a appris est que <em>CTurt<\/em> a acc\u00e8s \u00e0 la <em>RAM<\/em> et aux processus en cours d'ex\u00e9cution, si ce n'est une tr\u00e8s grosse attente et excitation de la part d'un peu tout le monde. Quoiqu'il en soit, nous vous conseillons de <strong>rester au taquet<\/strong>, une nouvelle peut venir n'importe quand (qu'elle soit bonne ou mauvaise ceci dit)&#8239;!&nbsp;\ud83d\ude00<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Du lourd \u00e0 pr\u00e9voir&#8239;?<\/p>\n","protected":false},"author":481,"featured_media":7968,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,29,30],"tags":[],"plateformes":[1014],"genres":[872,1740],"developpeurs":[1703],"editeurs":[1704],"types":[1126,864],"sources":[2028,2029],"class_list":["post-7943","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-news-underground","category-underground","plateformes-ps4","genres-exploits","genres-exploits-ps4","developpeurs-cturt","editeurs-cturt","types-hack-ps4","types-news","sources-httpwololo-net20151213ps4-jailbreak-possible-cturt-confirms-ram-dump","sources-httpstwitter-comcturte"],"yoast_head":"\n<title>Le hack PS4 rendu possible gr\u00e2ce \u00e0 un RAM Dump - Custom Pr.<\/title>\n<meta name=\"description\" content=\"Du lourd \u00e0 pr\u00e9voir ?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.customprotocol.com\/ps4-hack-ps4-rendu-possible-grace-ram-dump\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Le hack PS4 rendu possible gr\u00e2ce \u00e0 un RAM Dump - Custom Pr.\" \/>\n<meta property=\"og:description\" content=\"Du lourd \u00e0 pr\u00e9voir ?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.customprotocol.com\/ps4-hack-ps4-rendu-possible-grace-ram-dump\/\" \/>\n<meta property=\"og:site_name\" content=\"Custom Protocol\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-16T09:30:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.customprotocol.com\/medias\/2015\/12\/ps4-fond-bleu-joli-joli-hack-tete-de-mort-skull.png\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Wirus\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/HackerGen\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wirus\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimation du temps de lecture\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.customprotocol.com\/ps4-hack-ps4-rendu-possible-grace-ram-dump\/\",\"url\":\"https:\/\/www.customprotocol.com\/ps4-hack-ps4-rendu-possible-grace-ram-dump\/\",\"name\":\"Le hack PS4 rendu possible gr\u00e2ce \u00e0 un RAM Dump - Custom Pr.\",\"isPartOf\":{\"@id\":\"https:\/\/www.customprotocol.com\/#website\"},\"datePublished\":\"2015-12-16T09:30:45+00:00\",\"dateModified\":\"2015-12-16T09:30:45+00:00\",\"author\":{\"@id\":\"https:\/\/www.customprotocol.com\/#\/schema\/person\/e2f5c3e6cbb948e59756b98bed512cf9\"},\"description\":\"Du lourd \u00e0 pr\u00e9voir ?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.customprotocol.com\/ps4-hack-ps4-rendu-possible-grace-ram-dump\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.customprotocol.com\/ps4-hack-ps4-rendu-possible-grace-ram-dump\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.customprotocol.com\/ps4-hack-ps4-rendu-possible-grace-ram-dump\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.customprotocol.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"[PS4] Le hack PS4 rendu possible gr\u00e2ce \u00e0 un RAM Dump (CTurt)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.customprotocol.com\/#website\",\"url\":\"https:\/\/www.customprotocol.com\/\",\"name\":\"Custom Protocol\",\"description\":\"Site d&#039;hack-tualit\u00e9 et de tutoriels sur la customisation de consoles et appareils (homebrews, plugins, \u00e9mulation...)\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.customprotocol.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.customprotocol.com\/#\/schema\/person\/e2f5c3e6cbb948e59756b98bed512cf9\",\"name\":\"Wirus\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/www.customprotocol.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ff65bb0fba0be9639885c04a3ed7d8a895a98260fc23f283286dc9cf20bf3871?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ff65bb0fba0be9639885c04a3ed7d8a895a98260fc23f283286dc9cf20bf3871?s=96&d=mm&r=g\",\"caption\":\"Wirus\"},\"description\":\"Avez-vous d\u00e9j\u00e0 vu un gentil virus ? Maintenant, oui.\",\"sameAs\":[\"https:\/\/hackergen.com\",\"https:\/\/twitter.com\/https:\/\/twitter.com\/HackerGen\",\"https:\/\/www.youtube.com\/user\/Wirusalization\"],\"url\":\"https:\/\/www.customprotocol.com\/auteur\/wirus\/\"}]}<\/script>\n","yoast_head_json":{"title":"Le hack PS4 rendu possible gr\u00e2ce \u00e0 un RAM Dump - Custom Pr.","description":"Du lourd \u00e0 pr\u00e9voir ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.customprotocol.com\/ps4-hack-ps4-rendu-possible-grace-ram-dump\/","og_locale":"fr_CA","og_type":"article","og_title":"Le hack PS4 rendu possible gr\u00e2ce \u00e0 un RAM Dump - Custom Pr.","og_description":"Du lourd \u00e0 pr\u00e9voir ?","og_url":"https:\/\/www.customprotocol.com\/ps4-hack-ps4-rendu-possible-grace-ram-dump\/","og_site_name":"Custom Protocol","article_published_time":"2015-12-16T09:30:45+00:00","og_image":[{"width":623,"height":350,"url":"https:\/\/www.customprotocol.com\/medias\/2015\/12\/ps4-fond-bleu-joli-joli-hack-tete-de-mort-skull.png","type":"image\/png"}],"author":"Wirus","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/HackerGen","twitter_misc":{"\u00c9crit par":"Wirus","Estimation du temps de lecture":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.customprotocol.com\/ps4-hack-ps4-rendu-possible-grace-ram-dump\/","url":"https:\/\/www.customprotocol.com\/ps4-hack-ps4-rendu-possible-grace-ram-dump\/","name":"Le hack PS4 rendu possible gr\u00e2ce \u00e0 un RAM Dump - Custom Pr.","isPartOf":{"@id":"https:\/\/www.customprotocol.com\/#website"},"datePublished":"2015-12-16T09:30:45+00:00","dateModified":"2015-12-16T09:30:45+00:00","author":{"@id":"https:\/\/www.customprotocol.com\/#\/schema\/person\/e2f5c3e6cbb948e59756b98bed512cf9"},"description":"Du lourd \u00e0 pr\u00e9voir ?","breadcrumb":{"@id":"https:\/\/www.customprotocol.com\/ps4-hack-ps4-rendu-possible-grace-ram-dump\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.customprotocol.com\/ps4-hack-ps4-rendu-possible-grace-ram-dump\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.customprotocol.com\/ps4-hack-ps4-rendu-possible-grace-ram-dump\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.customprotocol.com\/"},{"@type":"ListItem","position":2,"name":"[PS4] Le hack PS4 rendu possible gr\u00e2ce \u00e0 un RAM Dump (CTurt)"}]},{"@type":"WebSite","@id":"https:\/\/www.customprotocol.com\/#website","url":"https:\/\/www.customprotocol.com\/","name":"Custom Protocol","description":"Site d&#039;hack-tualit\u00e9 et de tutoriels sur la customisation de consoles et appareils (homebrews, plugins, \u00e9mulation...)","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.customprotocol.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-CA"},{"@type":"Person","@id":"https:\/\/www.customprotocol.com\/#\/schema\/person\/e2f5c3e6cbb948e59756b98bed512cf9","name":"Wirus","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.customprotocol.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ff65bb0fba0be9639885c04a3ed7d8a895a98260fc23f283286dc9cf20bf3871?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ff65bb0fba0be9639885c04a3ed7d8a895a98260fc23f283286dc9cf20bf3871?s=96&d=mm&r=g","caption":"Wirus"},"description":"Avez-vous d\u00e9j\u00e0 vu un gentil virus ? Maintenant, oui.","sameAs":["https:\/\/hackergen.com","https:\/\/twitter.com\/https:\/\/twitter.com\/HackerGen","https:\/\/www.youtube.com\/user\/Wirusalization"],"url":"https:\/\/www.customprotocol.com\/auteur\/wirus\/"}]}},"_links":{"self":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/posts\/7943","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/users\/481"}],"replies":[{"embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/comments?post=7943"}],"version-history":[{"count":0,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/posts\/7943\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/media\/7968"}],"wp:attachment":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/media?parent=7943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/categories?post=7943"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/tags?post=7943"},{"taxonomy":"plateformes","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/plateformes?post=7943"},{"taxonomy":"genres","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/genres?post=7943"},{"taxonomy":"developpeurs","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/developpeurs?post=7943"},{"taxonomy":"editeurs","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/editeurs?post=7943"},{"taxonomy":"types","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/types?post=7943"},{"taxonomy":"sources","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/sources?post=7943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}