PS4 Crypto Coprocessor kernel exploit releases SAMU keys

  • Hello Guest! Welcome to ConsoleCrunch, to help support our site check out the premium upgrades HERE! to get exclusive access to our hidden content.
  • Unable to load portions of the website...
    If you use an ad blocker addon, you should disable it because it interferes with several elements of the site and blocks more than just adverts.
  • Read Rules Before Posting Post Virus Scans with every program.

Younis

Administrator
Staff member
Administrator
Local Celebrity
Community Elite
Community Veteran
Determined Poster
Active Member
Sep 27, 2013
2,071
2,634
743
A PS4 scene veteran Flat z revealed a PS4 Crypto Coprocessor attack and it has impacted all models. But Sony fixed this someplace between Firmwares 7.55 and 9.00.

tqePSNy.jpeg


Another day and another PlayStation 4 exploit have been revealed.

This glitch has some of its very exciting features but it may restrict you from using CFW.

Flat z's developed Crypto Coprocessor program can brute-force specific console keys like the AES/HMAC PFS, portability keys, and VTRM, which can later be exported.

If you are using firmware under 7.55, then you can use this exploit. Cause Sony has fixed this issue in the above 7.55 firmware.

Though this exploit is not of much use to the normal users we can wait to see what developer and scene veterans can do with this. Now we can hope they will change the PS4 Jailbreak scene with this.


Now, What do I do with this?

If you own a console running firmware 7.51 or below, you may be able to compile this code and execute it on a Jailbroken PS4 to extract some console-specific keys.

Like we said if you are using a console running on firmware 7.51 or below, you can use this code and run it on your JAilbreak PS4. You can extract some console-specific keys with that.

The use of these keys is still unclear on the scene. Most of the users and even some vet players are confused about it or what can be done with them.

So let's be clear on this point if you are not enough into the firmware business or their reverse engineering on the PS4, here is a small note for you.

According to the creator of this code, Flat z, each sort of key can and reverse execute PFS keys and they might be used to decrypt game packages and decrypt saved data.

If all of these turn out to be decryption keys, you won't be able to run a permanent CFW on the PS4.

So after all, if you want to try this one, the exploit's source code is available on the developer's Github page.
 

QM|T_JinX

Super Moderator
Staff member
Moderator
Retired Staff
Local Hero
Local Celebrity
Community Elite
Community Veteran
Determined Poster
Active Member
Console ID Poster
Oct 10, 2016
2,554
4,515
818
A PS4 scene veteran Flat z revealed a PS4 Crypto Coprocessor attack and it has impacted all models. But Sony fixed this someplace between Firmwares 7.55 and 9.00.

tqePSNy.jpeg


Another day and another PlayStation 4 exploit have been revealed.

This glitch has some of its very exciting features but it may restrict you from using CFW.

Flat z's developed Crypto Coprocessor program can brute-force specific console keys like the AES/HMAC PFS, portability keys, and VTRM, which can later be exported.

If you are using firmware under 7.55, then you can use this exploit. Cause Sony has fixed this issue in the above 7.55 firmware.

Though this exploit is not of much use to the normal users we can wait to see what developer and scene veterans can do with this. Now we can hope they will change the PS4 Jailbreak scene with this.


Now, What do I do with this?

If you own a console running firmware 7.51 or below, you may be able to compile this code and execute it on a Jailbroken PS4 to extract some console-specific keys.

Like we said if you are using a console running on firmware 7.51 or below, you can use this code and run it on your JAilbreak PS4. You can extract some console-specific keys with that.

The use of these keys is still unclear on the scene. Most of the users and even some vet players are confused about it or what can be done with them.

So let's be clear on this point if you are not enough into the firmware business or their reverse engineering on the PS4, here is a small note for you.

According to the creator of this code, Flat z, each sort of key can and reverse execute PFS keys and they might be used to decrypt game packages and decrypt saved data.

If all of these turn out to be decryption keys, you won't be able to run a permanent CFW on the PS4.

So after all, if you want to try this one, the exploit's source code is available on the developer's Github page.
Great post
 

Douglas Oliveira

Public Legend
Retired Staff
Local Legend
Local Hero
Local Celebrity
Community Elite
Community Veteran
Determined Poster
Active Member
Console ID Poster
Jun 5, 2015
3,915
7,501
1,268
Brasil
Thanks boss,good help
 
General chit-chat
Help Users
  • @ damario:
    um request only Dragonball z battle of z RTM tool v1.3 by DrobythePouNd420
  • @ damario:
    download link
  • @ damario:
    can u try to make it
  • @ damario:
    Character Changer - Max All - Unlock All
  • @ damario:
    if u have ever played it
  • @ QM|T_JinX:
    sorry can realy find a link
  • @ damario:
    have u played it
  • @ QM|T_JinX:
    i played kakarot on ps4 lol
  • @ damario:
    if so try to make as i dont know how to code
  • @ damario:
    the save wizard codes
  • @ damario:
    i use game genie ps3 save editor
  • @ damario:
    add me
  • @ damario:
    discord
  • @ damario:
    ill send screenshots of the rtm tool
  • @ damario:
    my discord name is Damario Culbreath
  • @ QM|T_JinX:
    name isnt working can add you send good name in pm ill check tomorrow im going to bed its 2 in the morning here
  • @ damario:
    sure
  • @ damario:
    whats your discord name
  • @ QM|T_JinX:
    qmt_jinx
  • @ QM|T_JinX:
    night everyboy im off
  • @ lurch6661:
    night bro
  • Chat Bot:
    Maaellziin is our newest member. Welcome!
  • Chat Bot:
    EvilNatDraxx is our newest member. Welcome!
  • Chat Bot:
    QM|T_JinX has joined the room.
  • @ QM|T_JinX:
    hey everybody
    @ QM|T_JinX: hey everybody