Skip to content

fork of Davi5Alexander/docker_pppwn, modified to use PPPwn C++

License

Notifications You must be signed in to change notification settings

sunqtronaut/docker-pppwn-cpp

 
 

Repository files navigation

Logo

Fork of Davi5Alexander/docker_pppwn, modified to use with xfangfang/PPPwn_cpp, due to its faster execution speed.

This repository contains Docker files to run xfangfang/PPPwn_cpp and TheOfficialFloW/PPPwn easily using an Alpine image. It's ideal for running on a Raspberry Pi with a dedicated USB to Ethernet port for the PS4. PPPwn is a kernel remote code execution exploit for PlayStation 4 up to FW 11.00. It's a proof-of-concept exploit for CVE-2006-4304 that was responsibly reported to PlayStation. Inspired by Davi5Alexander/docker_pppwn and stooged/PI-Pwn.

Requirements

  • PS4 with 11.00 firmware.
  • Docker installed on your system.
  • Ethernet cable.
  • USB with GoldHen (only for the first time).
  • Binaries for pppwn and stage1, stage2

Usage

  1. Clone the repository.
  2. Edit docker-compose.yml and change the environments: INTERFACE (eth0, eth1, etc).
  3. Run docker compose up -d; Follow the logs if needed docker compose logs -f
  4. Check the logs, stop the script, start it, and restart it using port 8066 on your server, for example, http://192.168.1.2:8066 (you can change it in nginx/default.conf).
  5. Turn on the PS4.

On your PS4 (first time):

  1. Insert the USB with goldhen.bin into the PS4.
  2. Go to Settings and then to Network.
  3. Select Set Up Internet Connection and choose Use a LAN Cable.
  4. Choose Custom Setup and select PPPoE for IP Address Settings.
  5. Enter anything for PPPoE User ID and PPPoE Password.
  6. Choose Automatic for DNS Settings and MTU Settings.
  7. Choose Do Not Use for Proxy Server.

Demo

About

fork of Davi5Alexander/docker_pppwn, modified to use PPPwn C++

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Languages

  • PHP 54.7%
  • Shell 28.9%
  • Dockerfile 8.8%
  • Makefile 7.6%