This is an experimental jailbreak for PS4 11.00 or lower using TheFloW disclosed exploit. This jailbreak is under development and does not working yet and may not working at all.
TheFloW already released a working version by himself so this repository will be a playground for us to learn how thing work.
- Computer with one Ethernet port available
- Ethernet cable
- Linux
- A VM running Linux may not work
You need to connect the PS4 and the computer with an Ethernet cable without any Ethernet switch in the middle.
Run the following command on the computer that connected with the PS4 to find the index of connected port:
ip link
It will output something like:
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
2: enp3s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000
link/ether ??:??:??:??:??:?? brd ff:ff:ff:ff:ff:ff
My computer has only one Ethernet so 2
is an obvious index for me. Once figure out run the following command:
sudo ./jailbreak-11 INDEX
Replace INDEX
with the Ethernet index then open the PS4 and go to Settings > Network > Set Up Internet Connection > Use a LAN Cable > Custom > PPPoE
. Enter a random PPPoE User ID
and PPPoE Password
.
- Rust on the latest stable channel
rustup target add x86_64-unknown-none
cargo install cargo-binutils
rustup component add llvm-tools
cargo objcopy -p payload --target x86_64-unknown-none --release -- -O binary payload.bin
cargo build
After this you can follow the instructions on the Running section by changing the ./jailbreak-11
to ./target/debug/jailbreak-11
.
MIT