Closed leonekwolfik closed 2 months ago
I also try the Python version but I get the same problem.
There is not much that can be done. If your console is throwing a kernel panic during the exploit and the firmware version selected is correct you might have a console that the exploit does not work on.
When try to run Pi-Pwn (C++) with PS4 PRO CUH-7216B with firmware 11.00 after a while the console turns off.
This happens when it reach
Sending IPCP configure ACK...
command. Then, when I start the console again, a memory checking appears.I try with Raspberry Pi Zero 2 W with Raspberry Pi OS Lite 64-bit. The OS and Pi-Pwn are updated.
I have tried with different network cables and different USB flash drives, but the problem always repeats.
The whole log:
[+] PPPwn++ - PlayStation 4 PPPoE RCE by theflow [+] args: interface=eth0 fw=1100 stage1=/boot/firmware/PPPwn/stage1_11.00.bin stage2=/boot/firmware/PPPwn/stage2_11.00.bin timeout=0 wait-after-pin=1 groom-delay=4 auto-retry=off no-wait-padi=off real_sleep=off [+] STAGE 0: Initialization [*] Waiting for PADI... [*] Waiting for PADI... [+] pppoe_softc: 0xffffe90d3002dc00 [+] Target MAC: c8:63:f1:f1:b4:5b [+] Source MAC: 07:dc:02:30:0d:e9 [+] AC cookie length: 4e0 [*] Sending PADO... [*] Waiting for PADR... [*] Sending PADS... [*] Sending LCP configure request... [*] Waiting for LCP configure ACK... [*] Waiting for LCP configure request... [*] Sending LCP configure ACK... [*] Sending IPCP configure request... [*] Waiting for IPCP configure ACK... [*] Waiting for IPCP configure request... [*] Sending IPCP configure NAK... [*] Waiting for IPCP configure request... [*] Sending IPCP configure ACK... [*] Waiting for interface to be ready... [+] Generate target IPv6 from MAC address [+] Target IPv6: fe80::ca63:f1ff:fef1:b45b [*] Heap grooming...0% [*] Heap grooming...6% [*] Heap grooming...12% [*] Heap grooming...18% [*] Heap grooming...25% [*] Heap grooming...31% [*] Heap grooming...37% [*] Heap grooming...43% [*] Heap grooming...50% [*] Heap grooming...56% [*] Heap grooming...62% [*] Heap grooming...68% [*] Heap grooming...75% [*] Heap grooming...81% [*] Heap grooming...87% [*] Heap grooming...93% [+] Heap grooming...done [+] STAGE 1: Memory corruption [*] Pinning to CPU 0...00% [*] Pinning to CPU 0...06% [*] Pinning to CPU 0...12% [*] Pinning to CPU 0...18% [*] Pinning to CPU 0...25% [*] Pinning to CPU 0...31% [*] Pinning to CPU 0...37% [*] Pinning to CPU 0...43% [*] Pinning to CPU 0...50% [*] Pinning to CPU 0...56% [*] Pinning to CPU 0...62% [*] Pinning to CPU 0...68% [*] Pinning to CPU 0...75% [*] Pinning to CPU 0...81% [*] Pinning to CPU 0...87% [*] Pinning to CPU 0...93% [+] Pinning to CPU 0...done [*] Sending malicious LCP configure request... [*] Waiting for LCP configure reject... [*] Sending LCP configure request... [*] Waiting for LCP configure ACK... [*] Waiting for LCP configure request... [*] Sending LCP configure ACK... [*] Sending IPCP configure request... [*] Waiting for IPCP configure ACK... [*] Waiting for IPCP configure request... [*] Sending IPCP configure NAK... [*] Waiting for IPCP configure request... [*] Sending IPCP configure ACK... [*] Scanning for corrupted object... 0xf00 [*] Scanning for corrupted object... 0xe00 [*] Scanning for corrupted object... 0xd00 [*] Scanning for corrupted object... 0xc00 [*] Scanning for corrupted object... 0xb00 [*] Scanning for corrupted object... 0xa00 [*] Scanning for corrupted object... 0x900 [*] Scanning for corrupted object... 0x800 [*] Scanning for corrupted object... 0x700 [*] Scanning for corrupted object... 0x600 [*] Scanning for corrupted object... 0x500 [*] Scanning for corrupted object... 0x400 [*] Scanning for corrupted object... 0x300 [*] Scanning for corrupted object... 0x200 [*] Scanning for corrupted object... 0x100 [*] Scanning for corrupted object... 0x000 [-] Scanning for corrupted object...failed. [+] PPPwn++ - PlayStation 4 PPPoE RCE by theflow [+] args: interface=eth0 fw=1100 stage1=/boot/firmware/PPPwn/stage1_11.00.bin stage2=/boot/firmware/PPPwn/stage2_11.00.bin timeout=0 wait-after-pin=1 groom-delay=4 auto-retry=off no-wait-padi=off real_sleep=off [+] STAGE 0: Initialization [*] Waiting for PADI... [*] Waiting for PADI... [+] pppoe_softc: 0xffffe90d3058d000 [+] Target MAC: c8:63:f1:f1:b4:5b [+] Source MAC: 07:d0:58:30:0d:e9 [+] AC cookie length: 4e0 [*] Sending PADO... [*] Waiting for PADR... [*] Sending PADS... [*] Sending LCP configure request... [*] Waiting for LCP configure ACK... [*] Waiting for LCP configure request... [*] Sending LCP configure ACK... [*] Sending IPCP configure request... [*] Waiting for IPCP configure ACK... [*] Waiting for IPCP configure request... [*] Sending IPCP configure NAK... [*] Waiting for IPCP configure request... [*] Sending IPCP configure ACK... [*] Waiting for interface to be ready... [+] Target IPv6: fe80::ca63:f1ff:fef1:b45b [*] Heap grooming...0% [*] Heap grooming...6% [*] Heap grooming...12% [*] Heap grooming...18% [*] Heap grooming...25% [*] Heap grooming...31% [*] Heap grooming...37% [*] Heap grooming...43% [*] Heap grooming...50% [*] Heap grooming...56% [*] Heap grooming...62% [*] Heap grooming...68% [*] Heap grooming...75% [*] Heap grooming...81% [*] Heap grooming...87% [*] Heap grooming...93% [+] Heap grooming...done [+] STAGE 1: Memory corruption [*] Pinning to CPU 0...00% [*] Pinning to CPU 0...06% [*] Pinning to CPU 0...12% [*] Pinning to CPU 0...18% [*] Pinning to CPU 0...25% [*] Pinning to CPU 0...31% [*] Pinning to CPU 0...37% [*] Pinning to CPU 0...43% [*] Pinning to CPU 0...50% [*] Pinning to CPU 0...56% [*] Pinning to CPU 0...62% [*] Pinning to CPU 0...68% [*] Pinning to CPU 0...75% [*] Pinning to CPU 0...81% [*] Pinning to CPU 0...87% [*] Pinning to CPU 0...93% [+] Pinning to CPU 0...done [*] Sending malicious LCP configure request... [*] Waiting for LCP configure reject... [*] Sending LCP configure request... [*] Waiting for LCP configure ACK... [*] Waiting for LCP configure request... [*] Sending LCP configure ACK... [*] Sending IPCP configure request... [*] Waiting for IPCP configure ACK... [*] Waiting for IPCP configure request... [*] Sending IPCP configure NAK... [*] Waiting for IPCP configure request... [*] Sending IPCP configure ACK... [*] Scanning for corrupted object... 0xf00 [*] Scanning for corrupted object... 0xe00 [*] Scanning for corrupted object... 0xd00 [*] Scanning for corrupted object... 0xc00 [*] Scanning for corrupted object... 0xb00 [*] Scanning for corrupted object... 0xa00 [*] Scanning for corrupted object... 0x900 [*] Scanning for corrupted object... 0x800 [*] Scanning for corrupted object... 0x700 [*] Scanning for corrupted object... 0x600 [*] Scanning for corrupted object... 0x500 [*] Scanning for corrupted object... 0x400 [*] Scanning for corrupted object... 0x300 [*] Scanning for corrupted object... 0x200 [*] Scanning for corrupted object... 0x100 [*] Scanning for corrupted object... 0x000 [-] Scanning for corrupted object...failed. [+] PPPwn++ - PlayStation 4 PPPoE RCE by theflow [+] args: interface=eth0 fw=1100 stage1=/boot/firmware/PPPwn/stage1_11.00.bin stage2=/boot/firmware/PPPwn/stage2_11.00.bin timeout=0 wait-after-pin=1 groom-delay=4 auto-retry=off no-wait-padi=off real_sleep=off [+] STAGE 0: Initialization [*] Waiting for PADI... [*] Waiting for PADI... [+] pppoe_softc: 0xffffe90d3058ca00 [+] Target MAC: c8:63:f1:f1:b4:5b [+] Source MAC: 07:ca:58:30:0d:e9 [+] AC cookie length: 4e0 [*] Sending PADO... [*] Waiting for PADR... [*] Sending PADS... [*] Sending LCP configure request... [*] Waiting for LCP configure ACK... [*] Waiting for LCP configure request... [*] Sending LCP configure ACK... [*] Sending IPCP configure request... [*] Waiting for IPCP configure ACK... [*] Waiting for IPCP configure request... [*] Sending IPCP configure NAK... [*] Waiting for IPCP configure request... [*] Sending IPCP configure ACK... [*] Waiting for interface to be ready... [+] Target IPv6: fe80::ca63:f1ff:fef1:b45b [*] Heap grooming...0% [*] Heap grooming...6% [*] Heap grooming...12% [*] Heap grooming...18% [*] Heap grooming...25% [*] Heap grooming...31% [*] Heap grooming...37% [*] Heap grooming...43% [*] Heap grooming...50% [*] Heap grooming...56% [*] Heap grooming...62% [*] Heap grooming...68% [*] Heap grooming...75% [*] Heap grooming...81% [*] Heap grooming...87% [*] Heap grooming...93% [+] Heap grooming...done [+] STAGE 1: Memory corruption [*] Pinning to CPU 0...00% [*] Pinning to CPU 0...06% [*] Pinning to CPU 0...12% [*] Pinning to CPU 0...18% [*] Pinning to CPU 0...25% [*] Pinning to CPU 0...31% [*] Pinning to CPU 0...37% [*] Pinning to CPU 0...43% [*] Pinning to CPU 0...50% [*] Pinning to CPU 0...56% [*] Pinning to CPU 0...62% [*] Pinning to CPU 0...68% [*] Pinning to CPU 0...75% [*] Pinning to CPU 0...81% [*] Pinning to CPU 0...87% [*] Pinning to CPU 0...93% [+] Pinning to CPU 0...done [*] Sending malicious LCP configure request... [*] Waiting for LCP configure reject... [*] Sending LCP configure request... [*] Waiting for LCP configure ACK... [*] Waiting for LCP configure request... [*] Sending LCP configure ACK... [*] Sending IPCP configure request... [*] Waiting for IPCP configure ACK... [*] Waiting for IPCP configure request... [*] Sending IPCP configure NAK... [*] Waiting for IPCP configure request... [*] Sending IPCP configure ACK...
Happens on ps4 slim too.. with rpi zero 2w with raspbian lite 32bit.
@leonekwolfik try to use the 32 bit os as there is a wifi issue in 64bit.. furthermore, the 32bit is enough for rpi zero 2w as it has 512mb ram, maybe give a try on zram if you need to compress the files stored in ram.
Ok, thanks you. I'll try with 32 bit version.
With 32 bit OS i have the same problem. But when I modified some parameters in main script I'm able to go to stage 2. More info: https://github.com/xfangfang/PPPwn_cpp/issues/48
Hopefully its things that can be adjusted Im on CUH-2115B and tried everything I will be following your post and trying it out aswell.
Question where did you adjust it at? Name?
Its being reported randomly across many console versons that it hits defeat kaslr then panics.
Its either the console or the ethernet adapter on the pi.
For instance the pi zero 2 with the enc28j60 fails regardless of console.
Got it Using the pi4b atm same results. Never finds corrupted file with both scripts, trying to look where to change the script to modify parameters atm. Ig gotta get a new ps4
Got it Using the pi4b atm same results. Never finds corrupted file with both scripts, trying to look where to change the script to modify parameters atm. Ig gotta get a new ps4
The values to change are mentioned here https://github.com/xfangfang/PPPwn_cpp/issues/48#issuecomment-2131230528
I try with Raspberry Pi Zero 2 W with Raspberry Pi OS Lite 64-bit.
you mentioned you are using the pi zero but what ethernet adapter are you using usb? spi hat?
your logs look very similar to the logs i was getting while testing the spi ethernet port on my pi zero 2.
Any recommendations on cuh-xxxxx model? Might just get a different console, tired of the cuh-2115b
I try with Raspberry Pi Zero 2 W with Raspberry Pi OS Lite 64-bit.
you mentioned you are using the pi zero but what ethernet adapter are you using usb? spi hat?
your logs look very similar to the logs i was getting while testing the spi ethernet port on my pi zero 2.
I'm using UGREEN USB 2.0 10/100 ethernet network adapter (Model: CR110)
its hard to find the specs on that but you can try something that i have been working on with the enc28j60 nic and pi-pwn in general.
for a test get a small ethernet switch like a little 5 port one and plug your pi into that then plug your ps4 into that and see what happens. run pppwn in its original state, no values modified.
PI ZERO2 <> SWITCH <> PS4
some ethernet adapters do not play well being directly connected device<>device but going through a switch they operate differently. it could be that some do not have mdi/mdix detection but even a xover cable does not work.
its worth a try anyway because when it comes to the enc28j60 ethernet adapter it is the only way it will progress through the exploit and successfully pwn.
its hard to find the specs on that but you can try something that i have been working on with the enc28j60 nic and pi-pwn in general.
for a test get a small ethernet switch like a little 5 port one and plug your pi into that then plug your ps4 into that and see what happens. run pppwn in its original state, no values modified.
PI ZERO2 <> SWITCH <> PS4
some ethernet adapters do not play well being directly connected device<>device but going through a switch they operate differently. it could be that some do not have mdi/mdix detection but even a xover cable does not work.
its worth a try anyway because when it comes to the enc28j60 ethernet adapter it is the only way it will progress through the exploit and successfully pwn.
The lan8720 module has mdi/mdix feature, i think it probably will work, have to test it.. But for now the usb ethernet works fine!.. im using sounce usb to ethernet adapter link
Feature request: (not a big of a deal but it would be cool) @stooged it would be really helpful if you can add a fan speed controller like in karo hosts.
As always thanks for this awesome project! Keep on keeping on!
When try to run Pi-Pwn (C++) with PS4 PRO CUH-7216B with firmware 11.00 after a while the console turns off.
This happens when it reach
Sending IPCP configure ACK...
command. Then, when I start the console again, a memory checking appears.I try with Raspberry Pi Zero 2 W with Raspberry Pi OS Lite 64-bit. The OS and Pi-Pwn are updated.
I have tried with different network cables and different USB flash drives, but the problem always repeats.
The whole log: