Younis
Administrator
Staff member
Administrator
Local Celebrity
Community Elite
Community Veteran
Determined Poster
Active Member
A PS4 scene veteran Flat z revealed a PS4 Crypto Coprocessor attack and it has impacted all models. But Sony fixed this someplace between Firmwares 7.55 and 9.00.
Another day and another PlayStation 4 exploit have been revealed.
This glitch has some of its very exciting features but it may restrict you from using CFW.
Flat z's developed Crypto Coprocessor program can brute-force specific console keys like the AES/HMAC PFS, portability keys, and VTRM, which can later be exported.
If you are using firmware under 7.55, then you can use this exploit. Cause Sony has fixed this issue in the above 7.55 firmware.
Though this exploit is not of much use to the normal users we can wait to see what developer and scene veterans can do with this. Now we can hope they will change the PS4 Jailbreak scene with this.
Now, What do I do with this?
If you own a console running firmware 7.51 or below, you may be able to compile this code and execute it on a Jailbroken PS4 to extract some console-specific keys.
Like we said if you are using a console running on firmware 7.51 or below, you can use this code and run it on your JAilbreak PS4. You can extract some console-specific keys with that.
The use of these keys is still unclear on the scene. Most of the users and even some vet players are confused about it or what can be done with them.
So let's be clear on this point if you are not enough into the firmware business or their reverse engineering on the PS4, here is a small note for you.
According to the creator of this code, Flat z, each sort of key can and reverse execute PFS keys and they might be used to decrypt game packages and decrypt saved data.
If all of these turn out to be decryption keys, you won't be able to run a permanent CFW on the PS4.
So after all, if you want to try this one, the exploit's source code is available on the developer's Github page.

Another day and another PlayStation 4 exploit have been revealed.
This glitch has some of its very exciting features but it may restrict you from using CFW.
Flat z's developed Crypto Coprocessor program can brute-force specific console keys like the AES/HMAC PFS, portability keys, and VTRM, which can later be exported.
If you are using firmware under 7.55, then you can use this exploit. Cause Sony has fixed this issue in the above 7.55 firmware.
Though this exploit is not of much use to the normal users we can wait to see what developer and scene veterans can do with this. Now we can hope they will change the PS4 Jailbreak scene with this.
Now, What do I do with this?
If you own a console running firmware 7.51 or below, you may be able to compile this code and execute it on a Jailbroken PS4 to extract some console-specific keys.
Like we said if you are using a console running on firmware 7.51 or below, you can use this code and run it on your JAilbreak PS4. You can extract some console-specific keys with that.
The use of these keys is still unclear on the scene. Most of the users and even some vet players are confused about it or what can be done with them.
So let's be clear on this point if you are not enough into the firmware business or their reverse engineering on the PS4, here is a small note for you.
According to the creator of this code, Flat z, each sort of key can and reverse execute PFS keys and they might be used to decrypt game packages and decrypt saved data.
If all of these turn out to be decryption keys, you won't be able to run a permanent CFW on the PS4.
So after all, if you want to try this one, the exploit's source code is available on the developer's Github page.