PPPwn in Docker
This repository contains Docker files to run PPPwn, developed by TheOfficialFloW, easily using an Alpine image. It's ideal for running on a Raspberry Pi with a dedicated USB to Ethernet port for the PS4. PPPwn is a kernel remote code execution exploit for PlayStation 4 up to FW 11.00. It's a proof-of-concept exploit for CVE-2006-4304 that was responsibly reported to PlayStation. I was inspired by PI-Pwn.
Requirements
- PS4 with 9.00, 10.00 or 11.00 firmware.
- Docker installed on your system.
- Ethernet cable.
- USB with GoldHen (only for the first time).
Usage
- Clone the repository.
- Edit
docker-compose.yml
and change the values of FIRMWAREVERSION
(900, 1000, or 1100) and INTERFACE
(eth0, eth1, etc).
- Run
docker-compose up -d
.
- Check the logs, stop the script, start it, and restart it using port 8066 on your server, for example, http://192.168.1.2:8066 (you can change it in
pppwn/web/nginx/default.conf
).
- Turn on the PS4.
On your PS4 (first time):
- Insert the USB with
goldhen.bin
into the PS4.
- Go to Settings and then to Network.
- Select Set Up Internet Connection and choose Use a LAN Cable.
- Choose Custom Setup and select PPPoE for IP Address Settings.
- Enter anything for PPPoE User ID and PPPoE Password.
- Choose Automatic for DNS Settings and MTU Settings.
- Choose Do Not Use for Proxy Server.