{"id":9112,"date":"2016-03-02T19:26:32","date_gmt":"2016-03-02T18:26:32","guid":{"rendered":"https:\/\/www.customprotocol.com\/?p=9112"},"modified":"2016-03-02T19:26:32","modified_gmt":"2016-03-02T18:26:32","slug":"ps4-code-exploit-kernel-bad-iret-en-ligne","status":"publish","type":"post","link":"https:\/\/www.customprotocol.com\/ps4-code-exploit-kernel-bad-iret-en-ligne\/","title":{"rendered":"[PS4] Le code de l&#8217;exploit kernel &#8220;Bad IRET&#8221; mis en ligne"},"content":{"rendered":"<p style=\"text-align: justify;\">Depuis quelques jours, un \"casse-noix\" a d\u00e9cid\u00e9 de secouer la sc\u00e8ne <em>underground<\/em> et a eu les \"bonnes id\u00e9es\" de mettre en ligne les identifiants, mots de passe et adresses IP des membres du site <em><a href=\"http:\/\/playstationhax.it\" target=\"_blank\" rel=\"noopener noreferrer\">PlayStationHax.it<\/a><\/em>, de supprimer la base de donn\u00e9es du <a href=\"http:\/\/vitadevwiki.com\" target=\"_blank\" rel=\"noopener noreferrer\"><em>PS Vita Dev Wiki<\/em><\/a> ainsi que le code de l'<strong>exploit kernel Bad IRET<\/strong>.<\/p>\n<p style=\"text-align: justify;\">Avant toute chose, je vous conseille de modifier de suite le mot de passe de votre compte <em>PSHax.it<\/em> (si vous en avez un) avant qu'il ne soit trop tard. Quant au <em>wiki<\/em>, ne vous inqui\u00e9tez pas, <em><a href=\"https:\/\/twitter.com\/GregoryRasputin\" target=\"_blank\" rel=\"noopener noreferrer\">GregoryRasputin<\/a><\/em> (le fondateur du site <em>hack\u00e9<\/em>) avait conserv\u00e9 une sauvegarde datant de fin 2015 sur son ordinateur. Ouf. Mais alors, qu'adviendra-t-il de cet <strong>exploit Bad IRET<\/strong>&#8239;?<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.customprotocol.com\/medias\/2015\/12\/ps4-fond-bleu-joli-joli-hack-tete-de-mort-skull.png\" rel=\"attachment wp-att-7968\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7968\" src=\"https:\/\/www.customprotocol.com\/medias\/2015\/12\/ps4-fond-bleu-joli-joli-hack-tete-de-mort-skull.png\" alt=\"ps4 fond bleu joli joli hack tete de mort skull\" width=\"623\" height=\"350\" srcset=\"https:\/\/www.customprotocol.com\/medias\/2015\/12\/ps4-fond-bleu-joli-joli-hack-tete-de-mort-skull.png 623w, https:\/\/www.customprotocol.com\/medias\/2015\/12\/ps4-fond-bleu-joli-joli-hack-tete-de-mort-skull-300x169.png 300w, https:\/\/www.customprotocol.com\/medias\/2015\/12\/ps4-fond-bleu-joli-joli-hack-tete-de-mort-skull-370x208.png 370w, https:\/\/www.customprotocol.com\/medias\/2015\/12\/ps4-fond-bleu-joli-joli-hack-tete-de-mort-skull-270x152.png 270w, https:\/\/www.customprotocol.com\/medias\/2015\/12\/ps4-fond-bleu-joli-joli-hack-tete-de-mort-skull-570x320.png 570w, https:\/\/www.customprotocol.com\/medias\/2015\/12\/ps4-fond-bleu-joli-joli-hack-tete-de-mort-skull-300x169@2x.png 600w\" sizes=\"auto, (max-width: 623px) 100vw, 623px\" \/><\/a><\/p>\n<hr \/>\n<p style=\"text-align: justify;\">L'info m'a \u00e9t\u00e9 transmise par <a href=\"https:\/\/twitter.com\/GREAFOXRMK\/status\/705058802417147904\" target=\"_blank\" rel=\"noopener noreferrer\"><em>GREAFOX<\/em><\/a> en premier lieu, et je me suis empress\u00e9 de remonter vers la source, <a href=\"https:\/\/twitter.com\/Senaxx\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Senaxx<\/em><\/a>, fondateur du site <em><a href=\"https:\/\/www.playstationscenefiles.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">PlayStationSceneFiles.com<\/a><\/em>. Celui-ci avait d\u00e9clar\u00e9 sur son compte <em>Twitter<\/em> que le d\u00e9veloppeur a l'origine de ce <em>hack<\/em> avait \u00e9t\u00e9... <em>hack\u00e9<\/em> (sans mauvais jeu de mot), que ces fichiers avaient \u00e9t\u00e9 vol\u00e9s dans la foul\u00e9e et que <em>CTurt<\/em>, grand d\u00e9veloppeur de la sc\u00e8ne <em>underground<\/em>, les avait finalement publi\u00e9s sur son <em>GitHub<\/em>.<\/p>\n<div align=\"center\">\n<blockquote class=\"twitter-tweet\" data-lang=\"fr\">\n<p dir=\"ltr\" lang=\"en\">PS4 Kernel Bad IRET exploit released: <a href=\"https:\/\/t.co\/S6tO6Lay35\">https:\/\/t.co\/S6tO6Lay35<\/a><\/p>\n<p>\u2014 Senaxx (@Senaxx) <a href=\"https:\/\/twitter.com\/Senaxx\/status\/705039565703258112\">2 mars 2016<\/a><\/p><\/blockquote>\n<p><script src=\"\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/div>\n<p style=\"text-align: justify;\">Sur le profil de <em><a href=\"https:\/\/twitter.com\/CTurtE\" target=\"_blank\" rel=\"noopener noreferrer\">CTurt<\/a><\/em>, on peut lire qu'il avait coop\u00e9r\u00e9 avec le fameux pirate en priv\u00e9, et que la plupart du code venait de ce dernier et qu'une partie seulement venait de lui (de <em>CTurt<\/em>, donc). Pour rappel, ce fameux <strong>exploit kernel <\/strong>avait d\u00e9j\u00e0 fait l'objet d'une <a href=\"https:\/\/www.customprotocol.com\/programmation\/ps4-explications-cturt-sur-exploit-kernel\/\" target=\"_blank\" rel=\"noopener noreferrer\">explication d\u00e9taill\u00e9e<\/a> de la part de <em>CTurt <\/em>avant qu'<a href=\"https:\/\/www.customprotocol.com\/underground\/ps4-cturt-livre-details-exploit-kernel-quitte-scene\/\" target=\"_blank\" rel=\"noopener noreferrer\">il ne quitte la sc\u00e8ne<\/a>, et il est \u00e9galement utilis\u00e9 par la <em>Team Fail0verflow<\/em> pour r\u00e9aliser son fameux <a href=\"https:\/\/www.customprotocol.com\/underground\/linux-sur-ps4-fail0verflow-rendu-pilotes-3d-fonctionnels\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>boot<\/em> sous Linux<\/a>, qui avait \u00e9t\u00e9 LE <a href=\"https:\/\/www.customprotocol.com\/underground\/fail0verflow-montre-linux-ps4-32c3-pokemon\/\" target=\"_blank\" rel=\"noopener noreferrer\">grand \u00e9v\u00e9nement<\/a> lors de la derni\u00e8re <em>Chaos Communication Congress<\/em>.<\/p>\n<div align=\"center\">\n<blockquote class=\"twitter-tweet\" data-lang=\"fr\">\n<p dir=\"ltr\" lang=\"en\"><a href=\"https:\/\/twitter.com\/cfwprophet\">@cfwprophet<\/a> Leaked BadIRET code comes from someone I helped privately after they read my articles. Mostly their code, with parts of mine.<\/p>\n<p>\u2014 CTurt (@CTurtE) <a href=\"https:\/\/twitter.com\/CTurtE\/status\/705067948206067712\">2 mars 2016<\/a><\/p><\/blockquote>\n<p><script src=\"\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/div>\n<p style=\"text-align: justify;\">N'oublions pas que l'<strong>exploit kernel<\/strong> ne concerne que les PS4 en <em>firmware<\/em> 1.76 ou inf\u00e9rieur. Par ailleurs, il semblerait que ce <em>leak<\/em> <strong>Bad IRET<\/strong> serait insuffisant pour <em>booter<\/em> sous Linux car il manquerait la restauration IDT et retournerait vers l'<em>userland<\/em> de la console, mais qu'elle ne serait toutefois pas difficile \u00e0 ajouter.<\/p>\n<figure id=\"attachment_9122\" aria-describedby=\"caption-attachment-9122\" style=\"width: 585px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.customprotocol.com\/medias\/2016\/03\/Tweet-CTurt-Linux-boot-exploit-kernel-PS4-Bad-IRET.png\" rel=\"attachment wp-att-9122\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9122\" src=\"https:\/\/www.customprotocol.com\/medias\/2016\/03\/Tweet-CTurt-Linux-boot-exploit-kernel-PS4-Bad-IRET.png\" alt=\"Tweet de CTurt (supprim\u00e9)\" width=\"585\" height=\"130\" srcset=\"https:\/\/www.customprotocol.com\/medias\/2016\/03\/Tweet-CTurt-Linux-boot-exploit-kernel-PS4-Bad-IRET.png 585w, https:\/\/www.customprotocol.com\/medias\/2016\/03\/Tweet-CTurt-Linux-boot-exploit-kernel-PS4-Bad-IRET-300x67.png 300w, https:\/\/www.customprotocol.com\/medias\/2016\/03\/Tweet-CTurt-Linux-boot-exploit-kernel-PS4-Bad-IRET-370x82.png 370w, https:\/\/www.customprotocol.com\/medias\/2016\/03\/Tweet-CTurt-Linux-boot-exploit-kernel-PS4-Bad-IRET-270x60.png 270w, https:\/\/www.customprotocol.com\/medias\/2016\/03\/Tweet-CTurt-Linux-boot-exploit-kernel-PS4-Bad-IRET-570x127.png 570w\" sizes=\"auto, (max-width: 585px) 100vw, 585px\" \/><\/a><figcaption id=\"caption-attachment-9122\" class=\"wp-caption-text\"><em>Tweet<\/em> de <em><a href=\"https:\/\/twitter.com\/CTurtE\" target=\"_blank\" rel=\"noopener noreferrer\">CTurt<\/a><\/em> (supprim\u00e9)<\/figcaption><\/figure>\n<p style=\"text-align: justify;\">Un autre nom de la sc\u00e8ne <em>hack<\/em>, <em><a href=\"https:\/\/twitter.com\/cfwprophet\" target=\"_blank\" rel=\"noopener noreferrer\">cfwprophet<\/a><\/em>, a tenu \u00e0 \u00e9claircir la situation sur son compte <em>Twitter<\/em>. C'est gr\u00e2ce \u00e0 lui que j'ai compris qu'une seule et m\u00eame personne avait pirat\u00e9 <em>PlayStationHax<\/em> et lib\u00e9r\u00e9 cet <strong>exploit kernel<\/strong>. Le d\u00e9veloppeur a expliqu\u00e9 qu'il ne souhaitait pas qu'il soit partag\u00e9 car il n'y voyait aucune utilit\u00e9 pour l'utilisateur <em>lambda<\/em>.<\/p>\n<div align=\"center\">\n<blockquote class=\"twitter-tweet\" data-conversation=\"none\" data-lang=\"fr\">\n<p dir=\"ltr\" lang=\"en\"><a href=\"https:\/\/twitter.com\/GREAFOXRMK\">@GREAFOXRMK<\/a> <a href=\"https:\/\/twitter.com\/Senaxx\">@Senaxx<\/a> <a href=\"https:\/\/twitter.com\/CTurtE\">@CTurtE<\/a> it's not an attack againsat you or the end user but try to see it from our point...<\/p>\n<p>\u2014 cfwprophet (@cfwprophet) <a href=\"https:\/\/twitter.com\/cfwprophet\/status\/705077894222061568\">2 mars 2016<\/a><\/p><\/blockquote>\n<p><script src=\"\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/div>\n<p style=\"text-align: justify;\">Bref, ces derni\u00e8res minutes ont \u00e9t\u00e9 tr\u00e8s agit\u00e9es, mais on dirait bien qu'aucune information compl\u00e9mentaire ne sera communiqu\u00e9e sur le code de l'<strong>exploit<\/strong>. Esp\u00e9rons qu'<em>AK47<\/em> (oui, c'est le pseudo du \"<em>hacker<\/em>\" apparemment, lol) n'a pas pr\u00e9vu d'autres coups fourr\u00e9s de ce genre (m\u00eame si alimente l'<em>hack-tu<\/em>, on pr\u00e9f\u00e8rerait que \u00e7a soit autrement...).<\/p>\n<p style=\"text-align: justify;\">Si vous souhaitez jeter un coup d'oeil au code de l'<strong>exploit kernel Bad IRET<\/strong>, vous pouvez t\u00e9l\u00e9charger l'archive via le site <em><a href=\"https:\/\/www.playstationscenefiles.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">PlayStationSceneFiles.com<\/a><\/em> (inscription requise) ou via le lien miroir.<\/p>\n<p style=\"text-align: justify;\"><div class=\"one_half\">\n<figure id=\"attachment_5235\" aria-describedby=\"caption-attachment-5235\" style=\"width: 528px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.playstationscenefiles.com\/file\/3104-ps4-bad-iret-kernel-exploit\/\" target=\"_blank\" rel=\"attachment wp-att-5235 noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5235 size-full\" src=\"https:\/\/www.customprotocol.com\/medias\/2015\/06\/bouton-telecharger-v2.png\" alt=\"Bouton t\u00e9l\u00e9charger\" width=\"528\" height=\"160\" srcset=\"https:\/\/www.customprotocol.com\/medias\/2015\/06\/bouton-telecharger-v2.png 528w, https:\/\/www.customprotocol.com\/medias\/2015\/06\/bouton-telecharger-v2-300x91.png 300w, https:\/\/www.customprotocol.com\/medias\/2015\/06\/bouton-telecharger-v2-370x112.png 370w, https:\/\/www.customprotocol.com\/medias\/2015\/06\/bouton-telecharger-v2-270x82.png 270w\" sizes=\"auto, (max-width: 528px) 100vw, 528px\" \/><\/a><figcaption id=\"caption-attachment-5235\" class=\"wp-caption-text\"><b>PS4 Bad IRET kernel exploit 1.0.0<\/b><br \/> <em><a href=\"https:\/\/mega.nz\/#!2FMDCS6Q!gsHGGI6OkvQwKVea0iIskj_SDK9z27JfYsckZhepfH8\" target=\"_blank\" rel=\"noopener noreferrer\">Lien miroir<\/a><\/em><\/figcaption><\/figure>\n<p style=\"text-align: justify;\"><\/div> <div class=\"one_half last\">\n<figure id=\"attachment_5235\" aria-describedby=\"caption-attachment-5235\" style=\"width: 528px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/mega.nz\/#!aFslSA6Z!zu377hfTFjCxC3u3X9u0yyPt6uu6T72Sip0xwYgn9cg\" target=\"_blank\" rel=\"attachment wp-att-5235 noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5235 size-full\" src=\"https:\/\/www.customprotocol.com\/medias\/2015\/06\/bouton-telecharger-v2.png\" alt=\"Bouton t\u00e9l\u00e9charger\" width=\"528\" height=\"160\" srcset=\"https:\/\/www.customprotocol.com\/medias\/2015\/06\/bouton-telecharger-v2.png 528w, https:\/\/www.customprotocol.com\/medias\/2015\/06\/bouton-telecharger-v2-300x91.png 300w, https:\/\/www.customprotocol.com\/medias\/2015\/06\/bouton-telecharger-v2-370x112.png 370w, https:\/\/www.customprotocol.com\/medias\/2015\/06\/bouton-telecharger-v2-270x82.png 270w\" sizes=\"auto, (max-width: 528px) 100vw, 528px\" \/><\/a><figcaption id=\"caption-attachment-5235\" class=\"wp-caption-text\"><b>PS4 Bad IRET kernel exploit 1.0.0<\/b> (version compil\u00e9e)<\/figcaption><\/figure>\n<p style=\"text-align: justify;\"><\/div><div class=\"clearboth\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Le code d'un exploit kernel semble avoir fuit\u00e9...<\/p>\n","protected":false},"author":481,"featured_media":7968,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,29,12,30],"tags":[2227],"plateformes":[1014],"genres":[872,873,1740],"developpeurs":[],"editeurs":[2229],"types":[1126,864],"sources":[2228],"class_list":["post-9112","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-news-underground","category-top","category-underground","tag-bad-iret","plateformes-ps4","genres-exploits","genres-exploits-kernel","genres-exploits-ps4","editeurs-senaxx","types-hack-ps4","types-news","sources-httpswww-playstationscenefiles-comfile3104-ps4-bad-iret-kernel-exploit"],"yoast_head":"\n<title>[PS4] L&#039;exploit kernel &quot;Bad IRET&quot; mis en ligne - Custom Prot.<\/title>\n<meta name=\"description\" content=\"Le code d&#039;un exploit kernel semble avoir fuit\u00e9...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.customprotocol.com\/ps4-code-exploit-kernel-bad-iret-en-ligne\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"[PS4] L&#039;exploit kernel &quot;Bad IRET&quot; mis en ligne - Custom Prot.\" \/>\n<meta property=\"og:description\" content=\"Le code d&#039;un exploit kernel semble avoir fuit\u00e9...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.customprotocol.com\/ps4-code-exploit-kernel-bad-iret-en-ligne\/\" \/>\n<meta property=\"og:site_name\" content=\"Custom Protocol\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-02T18:26:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.customprotocol.com\/medias\/2015\/12\/ps4-fond-bleu-joli-joli-hack-tete-de-mort-skull.png\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Wirus\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/HackerGen\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wirus\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimation du temps de lecture\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.customprotocol.com\/ps4-code-exploit-kernel-bad-iret-en-ligne\/\",\"url\":\"https:\/\/www.customprotocol.com\/ps4-code-exploit-kernel-bad-iret-en-ligne\/\",\"name\":\"[PS4] L'exploit kernel \\\"Bad IRET\\\" mis en ligne - Custom Prot.\",\"isPartOf\":{\"@id\":\"https:\/\/www.customprotocol.com\/#website\"},\"datePublished\":\"2016-03-02T18:26:32+00:00\",\"dateModified\":\"2016-03-02T18:26:32+00:00\",\"author\":{\"@id\":\"https:\/\/www.customprotocol.com\/#\/schema\/person\/e2f5c3e6cbb948e59756b98bed512cf9\"},\"description\":\"Le code d'un exploit kernel semble avoir fuit\u00e9...\",\"breadcrumb\":{\"@id\":\"https:\/\/www.customprotocol.com\/ps4-code-exploit-kernel-bad-iret-en-ligne\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.customprotocol.com\/ps4-code-exploit-kernel-bad-iret-en-ligne\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.customprotocol.com\/ps4-code-exploit-kernel-bad-iret-en-ligne\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.customprotocol.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"[PS4] Le code de l&#8217;exploit kernel &#8220;Bad IRET&#8221; mis en ligne\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.customprotocol.com\/#website\",\"url\":\"https:\/\/www.customprotocol.com\/\",\"name\":\"Custom Protocol\",\"description\":\"Site d&#039;hack-tualit\u00e9 et de tutoriels sur la customisation de consoles et appareils (homebrews, plugins, \u00e9mulation...)\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.customprotocol.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.customprotocol.com\/#\/schema\/person\/e2f5c3e6cbb948e59756b98bed512cf9\",\"name\":\"Wirus\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/www.customprotocol.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ff65bb0fba0be9639885c04a3ed7d8a895a98260fc23f283286dc9cf20bf3871?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ff65bb0fba0be9639885c04a3ed7d8a895a98260fc23f283286dc9cf20bf3871?s=96&d=mm&r=g\",\"caption\":\"Wirus\"},\"description\":\"Avez-vous d\u00e9j\u00e0 vu un gentil virus ? Maintenant, oui.\",\"sameAs\":[\"https:\/\/hackergen.com\",\"https:\/\/twitter.com\/https:\/\/twitter.com\/HackerGen\",\"https:\/\/www.youtube.com\/user\/Wirusalization\"],\"url\":\"https:\/\/www.customprotocol.com\/auteur\/wirus\/\"}]}<\/script>\n","yoast_head_json":{"title":"[PS4] L'exploit kernel \"Bad IRET\" mis en ligne - Custom Prot.","description":"Le code d'un exploit kernel semble avoir fuit\u00e9...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.customprotocol.com\/ps4-code-exploit-kernel-bad-iret-en-ligne\/","og_locale":"fr_CA","og_type":"article","og_title":"[PS4] L'exploit kernel \"Bad IRET\" mis en ligne - Custom Prot.","og_description":"Le code d'un exploit kernel semble avoir fuit\u00e9...","og_url":"https:\/\/www.customprotocol.com\/ps4-code-exploit-kernel-bad-iret-en-ligne\/","og_site_name":"Custom Protocol","article_published_time":"2016-03-02T18:26:32+00:00","og_image":[{"width":623,"height":350,"url":"https:\/\/www.customprotocol.com\/medias\/2015\/12\/ps4-fond-bleu-joli-joli-hack-tete-de-mort-skull.png","type":"image\/png"}],"author":"Wirus","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/HackerGen","twitter_misc":{"\u00c9crit par":"Wirus","Estimation du temps de lecture":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.customprotocol.com\/ps4-code-exploit-kernel-bad-iret-en-ligne\/","url":"https:\/\/www.customprotocol.com\/ps4-code-exploit-kernel-bad-iret-en-ligne\/","name":"[PS4] L'exploit kernel \"Bad IRET\" mis en ligne - Custom Prot.","isPartOf":{"@id":"https:\/\/www.customprotocol.com\/#website"},"datePublished":"2016-03-02T18:26:32+00:00","dateModified":"2016-03-02T18:26:32+00:00","author":{"@id":"https:\/\/www.customprotocol.com\/#\/schema\/person\/e2f5c3e6cbb948e59756b98bed512cf9"},"description":"Le code d'un exploit kernel semble avoir fuit\u00e9...","breadcrumb":{"@id":"https:\/\/www.customprotocol.com\/ps4-code-exploit-kernel-bad-iret-en-ligne\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.customprotocol.com\/ps4-code-exploit-kernel-bad-iret-en-ligne\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.customprotocol.com\/ps4-code-exploit-kernel-bad-iret-en-ligne\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.customprotocol.com\/"},{"@type":"ListItem","position":2,"name":"[PS4] Le code de l&#8217;exploit kernel &#8220;Bad IRET&#8221; mis en ligne"}]},{"@type":"WebSite","@id":"https:\/\/www.customprotocol.com\/#website","url":"https:\/\/www.customprotocol.com\/","name":"Custom Protocol","description":"Site d&#039;hack-tualit\u00e9 et de tutoriels sur la customisation de consoles et appareils (homebrews, plugins, \u00e9mulation...)","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.customprotocol.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-CA"},{"@type":"Person","@id":"https:\/\/www.customprotocol.com\/#\/schema\/person\/e2f5c3e6cbb948e59756b98bed512cf9","name":"Wirus","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.customprotocol.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ff65bb0fba0be9639885c04a3ed7d8a895a98260fc23f283286dc9cf20bf3871?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ff65bb0fba0be9639885c04a3ed7d8a895a98260fc23f283286dc9cf20bf3871?s=96&d=mm&r=g","caption":"Wirus"},"description":"Avez-vous d\u00e9j\u00e0 vu un gentil virus ? Maintenant, oui.","sameAs":["https:\/\/hackergen.com","https:\/\/twitter.com\/https:\/\/twitter.com\/HackerGen","https:\/\/www.youtube.com\/user\/Wirusalization"],"url":"https:\/\/www.customprotocol.com\/auteur\/wirus\/"}]}},"_links":{"self":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/posts\/9112","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/users\/481"}],"replies":[{"embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/comments?post=9112"}],"version-history":[{"count":0,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/posts\/9112\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/media\/7968"}],"wp:attachment":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/media?parent=9112"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/categories?post=9112"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/tags?post=9112"},{"taxonomy":"plateformes","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/plateformes?post=9112"},{"taxonomy":"genres","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/genres?post=9112"},{"taxonomy":"developpeurs","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/developpeurs?post=9112"},{"taxonomy":"editeurs","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/editeurs?post=9112"},{"taxonomy":"types","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/types?post=9112"},{"taxonomy":"sources","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/sources?post=9112"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}