(adsbygoogle = window.adsbygoogle || []).push({});
This is semi old news but i couldn't find any thread on NGU,
I stumbled upon this payload via
extreme-modding.de, whilst using their webkit playground.
I have tested this payload myself and confirm working.
What is it:
It is pretty much the dlclose exploit, Privilege escalation/enables debug settings etc.
But lezek20 has made it to patch kernel to permanently allow use of internet browser without signing into PSN.
Where to Download:
You must login or register to view this content.
How to use:
you may require netcat to send the file to your ps4.
1. Using your 1.76 Ps4 Visit the PS4 Webkit playground - using your prefered method ( User Guide, Proxy, DNS )*
2. Once page has loaded click start code execution
3. Once the [Not started] Text has changed to "waiting for payload" and the page has loaded, Send the file via netcat (
Linux: nc -w 3 192.168.xxx.xxx 9023 < *.bin
Windows: nc 192.168.xxx.xxx 9023 < *.bin)
4. You can now use the web browser without PSN access, bookmark the PS4 playground and enjoy.
Note:
*.bin =
ps4_dev-dlclose_(Browser)_Kernel_Patch.bin or whatever the payloads .bin file is called
-
[Optional Extra]
Change IP to your computers.
This aint needed, but if you'd like to see the output response on your computer whilst executing the payload
You will have to edit the IP Address stored in the .bin, I made a simple program to make that easier for anybody interested
Download:
Permanent Browser Payload Ip Patcher - You must login or register to view this content.
Image / Virus Scan
You must login or register to view this content.
Virus Scan:
You must login or register to view this content.
The program is not encrypted, and i can share source if needed. still surprisingly 1 false positive.
How to Use:
Simply run the above .exe,
using the .exe, open the .bin file,
Edit the IP address to your computers address.
In most cases you should leave port as 9023.
Patch the bin, and it is ready for use.
To listen to Ps4 output you can use Linux: nc -l 9023
Don't trust the .exe?
Alternatively you can patch the address manually using HxD or another editor:
IP's Address: 0x846
Ports Address: 0x84B
Also since this is messing with kernel i guess i should add : Use at your own risk, i am not responsible for any damages that occur from using this blah blah xD.