{"id":9968,"date":"2016-04-22T12:05:41","date_gmt":"2016-04-22T10:05:41","guid":{"rendered":"https:\/\/www.customprotocol.com\/?p=9968"},"modified":"2016-04-22T12:05:41","modified_gmt":"2016-04-22T10:05:41","slug":"ps4-exploit-webkit-fonctionnel-firmwares-2-xx","status":"publish","type":"post","link":"https:\/\/www.customprotocol.com\/ps4-exploit-webkit-fonctionnel-firmwares-2-xx\/","title":{"rendered":"[PS4] Exploit Webkit fonctionnel sur les firmwares 2.XX&#8239;?"},"content":{"rendered":"<p style=\"text-align: justify;\"><div align=\"justify\" class=\"signoff\"><i class=\"fa fa-fw fa-book\"><\/i>Cet article fut \u00e9crit sur la base de l'<a href=\"http:\/\/wololo.net\/2016\/04\/21\/proof-of-concept-webkit-exploit-running-on-ps4-firmwares-up\/\" target=\"_blank\" rel=\"noopener noreferrer\">article de <em>Wololo<\/em><\/a>, merci \u00e0 lui.<\/div>\n<p style=\"text-align: justify;\"><em>Wololo<\/em> l'a annonc\u00e9 hier soir, le d\u00e9veloppeur <em>Fire30<\/em> aurait fourni un <em>proof of concept<\/em> (une <a href=\"https:\/\/fr.wikipedia.org\/wiki\/Preuve_de_concept\" target=\"_blank\" rel=\"noopener noreferrer\">preuve de concept<\/a>) d'un portage de l'<strong>exploit<\/strong> <strong>webkit<\/strong> de\u00a0<em>Liang Chen<\/em> (datant de 2014), fonctionnant pour la d\u00e9monstration sur une PlayStation 4 sous <em>firmware<\/em> 2.03.<\/p>\n<p><a href=\"https:\/\/www.customprotocol.com\/medias\/2015\/12\/ps4-fond-bleu-joli-joli-hack-tete-de-mort-skull.png\" rel=\"attachment wp-att-7968\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7968\" src=\"https:\/\/www.customprotocol.com\/medias\/2015\/12\/ps4-fond-bleu-joli-joli-hack-tete-de-mort-skull.png\" alt=\"ps4 fond bleu joli joli hack tete de mort skull\" width=\"623\" height=\"350\" srcset=\"https:\/\/www.customprotocol.com\/medias\/2015\/12\/ps4-fond-bleu-joli-joli-hack-tete-de-mort-skull.png 623w, https:\/\/www.customprotocol.com\/medias\/2015\/12\/ps4-fond-bleu-joli-joli-hack-tete-de-mort-skull-300x169.png 300w, https:\/\/www.customprotocol.com\/medias\/2015\/12\/ps4-fond-bleu-joli-joli-hack-tete-de-mort-skull-370x208.png 370w, https:\/\/www.customprotocol.com\/medias\/2015\/12\/ps4-fond-bleu-joli-joli-hack-tete-de-mort-skull-270x152.png 270w, https:\/\/www.customprotocol.com\/medias\/2015\/12\/ps4-fond-bleu-joli-joli-hack-tete-de-mort-skull-570x320.png 570w, https:\/\/www.customprotocol.com\/medias\/2015\/12\/ps4-fond-bleu-joli-joli-hack-tete-de-mort-skull-300x169@2x.png 600w\" sizes=\"auto, (max-width: 623px) 100vw, 623px\" \/><\/a><\/p>\n<hr \/>\n<p style=\"text-align: justify;\">Le d\u00e9veloppeur aura d\u00e9clar\u00e9 en passant que sa r\u00e9\u00e9criture de l'<strong>exploit<\/strong> devrait fonctionner avec <strong>tous les <em>firmwares<\/em> de 2.00 \u00e0 2.50<\/strong>, tout en rappelant qu'une partie de son code tel qu'il est actuellement ne devrait fonctionner que sous<strong> 2.03<\/strong>. C'est en effet le <em>firmware<\/em> qui a \u00e9t\u00e9 utilis\u00e9 durant l'\u00e9criture de son code.\u00a0<\/p>\n<p style=\"text-align: justify;\">De l\u00e0 \u00e0 imaginer un portage de l'<a href=\"https:\/\/www.customprotocol.com\/underground\/ps4-fichiers-compiles-lancer-exploit-dlclose-linux-sur-ps4-kr105\/\" target=\"_blank\" rel=\"noopener noreferrer\">exploit <em>dlclose<\/em><\/a>, permettant le <em>jailbreak<\/em> de la console et le <a href=\"https:\/\/www.customprotocol.com\/underground\/ps4-tuto-linux-sur-votre-ps4\/\" target=\"_blank\" rel=\"noopener noreferrer\">portage de Linux<\/a> tel que nous l'avons actuellement en 1.76, il n'y a \u00e9videmment qu'un pas. Au rythme o\u00f9 vont les choses, nous pouvons donc \u00eatre tr\u00e8s optimistes quant \u00e0 l'avenir du <strong>hack de la PlayStation 4<\/strong>&#8239;!&nbsp;\ud83d\ude00 <\/p>\n<p style=\"text-align: justify;\">Si vous pensez avoir les comp\u00e9tences n\u00e9cessaires, vous pouvez bien \u00e9videmment t\u00e9l\u00e9charger le <em>proof of concept<\/em> sur le <a href=\"https:\/\/github.com\/Fire30\/PS4-2014-1303-POC\" target=\"_blank\" rel=\"noopener noreferrer\"><em>GitHub <\/em>de Fire30<\/a>. Il vous faudra donc \u00eatre en 2.50, et de pr\u00e9f\u00e9rence en 2.03.<\/p>\n<p style=\"text-align: justify;\"><strong>Si jamais vous arrivez \u00e0 le faire fonctionner, n'h\u00e9sitez pas \u00e0 nous le signaler dans les commentaires<\/strong>&#8239;!&nbsp;\ud83d\ude00<\/p>\n<p style=\"text-align: justify;\"><blockquote><p><div align=\"justify\"><em>Cr\u00e9dits de l'<strong>exploit<\/strong>&nbsp;: Fire30, Liang Chen, thexyz, dreadlyei<\/em><\/div><\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>Le d\u00e9veloppeur Fire30 aurait fourni un PoC d'un portage de l'exploit webkit de Liang Chen (datant de 2014) fonctionnant sous le firmware 2.03.<\/p>\n","protected":false},"author":270,"featured_media":7968,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,29,71,30],"tags":[],"plateformes":[1014],"genres":[1105,1741,872,1740,2362,2363],"developpeurs":[2389,2390,2393,2394],"editeurs":[2391],"types":[1126,864],"sources":[2392],"class_list":["post-9968","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-news-underground","category-outils","category-underground","plateformes-ps4","genres-exploit-webkit","genres-exploit-webkit-pour-ps4","genres-exploits","genres-exploits-ps4","genres-outils-de-hack","genres-outils-de-hack-ps4","developpeurs-dreadlyei","developpeurs-fire30","developpeurs-liang-chen","developpeurs-thexyz","editeurs-fire30","types-hack-ps4","types-news","sources-httpwololo-net20160421proof-of-concept-webkit-exploit-running-on-ps4-firmwares-up"],"yoast_head":"\n<title>[PS4] Exploit Webkit fonctionnel sur les firmwares 2.XX ? - Custom Protocol<\/title>\n<meta name=\"description\" content=\"Le d\u00e9veloppeur Fire30 aurait fourni un PoC d&#039;un portage de l&#039;exploit webkit de Liang Chen (2014) fonctionnant sous le firmware 2.03.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.customprotocol.com\/ps4-exploit-webkit-fonctionnel-firmwares-2-xx\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"[PS4] Exploit Webkit fonctionnel sur les firmwares 2.XX ? - Custom Protocol\" \/>\n<meta property=\"og:description\" content=\"Le d\u00e9veloppeur Fire30 aurait fourni un PoC d&#039;un portage de l&#039;exploit webkit de Liang Chen (2014) fonctionnant sous le firmware 2.03.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.customprotocol.com\/ps4-exploit-webkit-fonctionnel-firmwares-2-xx\/\" \/>\n<meta property=\"og:site_name\" content=\"Custom Protocol\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-22T10:05:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.customprotocol.com\/medias\/2015\/12\/ps4-fond-bleu-joli-joli-hack-tete-de-mort-skull.png\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Macrey\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Macrey\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimation du temps de lecture\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.customprotocol.com\/ps4-exploit-webkit-fonctionnel-firmwares-2-xx\/\",\"url\":\"https:\/\/www.customprotocol.com\/ps4-exploit-webkit-fonctionnel-firmwares-2-xx\/\",\"name\":\"[PS4] Exploit Webkit fonctionnel sur les firmwares 2.XX ? - Custom Protocol\",\"isPartOf\":{\"@id\":\"https:\/\/www.customprotocol.com\/#website\"},\"datePublished\":\"2016-04-22T10:05:41+00:00\",\"dateModified\":\"2016-04-22T10:05:41+00:00\",\"author\":{\"@id\":\"https:\/\/www.customprotocol.com\/#\/schema\/person\/8d8d3754ba9ec4184fccc4ba36620c5b\"},\"description\":\"Le d\u00e9veloppeur Fire30 aurait fourni un PoC d'un portage de l'exploit webkit de Liang Chen (2014) fonctionnant sous le firmware 2.03.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.customprotocol.com\/ps4-exploit-webkit-fonctionnel-firmwares-2-xx\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.customprotocol.com\/ps4-exploit-webkit-fonctionnel-firmwares-2-xx\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.customprotocol.com\/ps4-exploit-webkit-fonctionnel-firmwares-2-xx\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.customprotocol.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"[PS4] Exploit Webkit fonctionnel sur les firmwares 2.XX&#8239;?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.customprotocol.com\/#website\",\"url\":\"https:\/\/www.customprotocol.com\/\",\"name\":\"Custom Protocol\",\"description\":\"Site d&#039;hack-tualit\u00e9 et de tutoriels sur la customisation de consoles et appareils (homebrews, plugins, \u00e9mulation...)\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.customprotocol.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.customprotocol.com\/#\/schema\/person\/8d8d3754ba9ec4184fccc4ba36620c5b\",\"name\":\"Macrey\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/www.customprotocol.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/509749ea7c70b35a8e92956969ce81a90cf07581fa092bf18bd479f14c9f578e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/509749ea7c70b35a8e92956969ce81a90cf07581fa092bf18bd479f14c9f578e?s=96&d=mm&r=g\",\"caption\":\"Macrey\"},\"url\":\"https:\/\/www.customprotocol.com\/auteur\/macrey\/\"}]}<\/script>\n","yoast_head_json":{"title":"[PS4] Exploit Webkit fonctionnel sur les firmwares 2.XX ? - Custom Protocol","description":"Le d\u00e9veloppeur Fire30 aurait fourni un PoC d'un portage de l'exploit webkit de Liang Chen (2014) fonctionnant sous le firmware 2.03.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.customprotocol.com\/ps4-exploit-webkit-fonctionnel-firmwares-2-xx\/","og_locale":"fr_CA","og_type":"article","og_title":"[PS4] Exploit Webkit fonctionnel sur les firmwares 2.XX ? - Custom Protocol","og_description":"Le d\u00e9veloppeur Fire30 aurait fourni un PoC d'un portage de l'exploit webkit de Liang Chen (2014) fonctionnant sous le firmware 2.03.","og_url":"https:\/\/www.customprotocol.com\/ps4-exploit-webkit-fonctionnel-firmwares-2-xx\/","og_site_name":"Custom Protocol","article_published_time":"2016-04-22T10:05:41+00:00","og_image":[{"width":623,"height":350,"url":"https:\/\/www.customprotocol.com\/medias\/2015\/12\/ps4-fond-bleu-joli-joli-hack-tete-de-mort-skull.png","type":"image\/png"}],"author":"Macrey","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Macrey","Estimation du temps de lecture":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.customprotocol.com\/ps4-exploit-webkit-fonctionnel-firmwares-2-xx\/","url":"https:\/\/www.customprotocol.com\/ps4-exploit-webkit-fonctionnel-firmwares-2-xx\/","name":"[PS4] Exploit Webkit fonctionnel sur les firmwares 2.XX ? - Custom Protocol","isPartOf":{"@id":"https:\/\/www.customprotocol.com\/#website"},"datePublished":"2016-04-22T10:05:41+00:00","dateModified":"2016-04-22T10:05:41+00:00","author":{"@id":"https:\/\/www.customprotocol.com\/#\/schema\/person\/8d8d3754ba9ec4184fccc4ba36620c5b"},"description":"Le d\u00e9veloppeur Fire30 aurait fourni un PoC d'un portage de l'exploit webkit de Liang Chen (2014) fonctionnant sous le firmware 2.03.","breadcrumb":{"@id":"https:\/\/www.customprotocol.com\/ps4-exploit-webkit-fonctionnel-firmwares-2-xx\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.customprotocol.com\/ps4-exploit-webkit-fonctionnel-firmwares-2-xx\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.customprotocol.com\/ps4-exploit-webkit-fonctionnel-firmwares-2-xx\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.customprotocol.com\/"},{"@type":"ListItem","position":2,"name":"[PS4] Exploit Webkit fonctionnel sur les firmwares 2.XX&#8239;?"}]},{"@type":"WebSite","@id":"https:\/\/www.customprotocol.com\/#website","url":"https:\/\/www.customprotocol.com\/","name":"Custom Protocol","description":"Site d&#039;hack-tualit\u00e9 et de tutoriels sur la customisation de consoles et appareils (homebrews, plugins, \u00e9mulation...)","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.customprotocol.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-CA"},{"@type":"Person","@id":"https:\/\/www.customprotocol.com\/#\/schema\/person\/8d8d3754ba9ec4184fccc4ba36620c5b","name":"Macrey","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.customprotocol.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/509749ea7c70b35a8e92956969ce81a90cf07581fa092bf18bd479f14c9f578e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/509749ea7c70b35a8e92956969ce81a90cf07581fa092bf18bd479f14c9f578e?s=96&d=mm&r=g","caption":"Macrey"},"url":"https:\/\/www.customprotocol.com\/auteur\/macrey\/"}]}},"_links":{"self":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/posts\/9968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/users\/270"}],"replies":[{"embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/comments?post=9968"}],"version-history":[{"count":0,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/posts\/9968\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/media\/7968"}],"wp:attachment":[{"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/media?parent=9968"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/categories?post=9968"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/tags?post=9968"},{"taxonomy":"plateformes","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/plateformes?post=9968"},{"taxonomy":"genres","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/genres?post=9968"},{"taxonomy":"developpeurs","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/developpeurs?post=9968"},{"taxonomy":"editeurs","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/editeurs?post=9968"},{"taxonomy":"types","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/types?post=9968"},{"taxonomy":"sources","embeddable":true,"href":"https:\/\/www.customprotocol.com\/api\/wp\/v2\/sources?post=9968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}