This is an experimental jailbreak for PS4 11.00 or lower based on TheFloW proof-of-concept exploit. This jailbreak is under development and does not working yet.
Same as TheFloW proof-of-concept, except Python and GCC are not required.
You need to connect the PS4 and the computer with an Ethernet cable without any Ethernet switch in the middle.
Run the following command on the computer that connected with the PS4 to find the index of connected port:
ip link
It will output something like:
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
2: enp3s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000
link/ether ??:??:??:??:??:?? brd ff:ff:ff:ff:ff:ff
My computer has only one Ethernet so 2
is an obvious index for me. Once figure out run the following command:
sudo ./jailbreak-11 INDEX
Replace INDEX
with the Ethernet index then open the PS4 and go to Settings > Network > Set Up Internet Connection > Use a LAN Cable > Custom > PPPoE
. Enter a random PPPoE User ID
and PPPoE Password
.
- Rust on the latest stable channel
rustup target add x86_64-unknown-none
cargo install cargo-binutils
rustup component add llvm-tools
cargo objcopy -p payload --target x86_64-unknown-none --release -- -O binary payload.bin
cargo build
After this you can follow the instructions on the Running section by changing the ./jailbreak-11
to ./target/debug/jailbreak-11
.
MIT