In the Video below, we can see the hacker running an FTP server, among other things, on the PS4 that was hacked in Rest mode.
According to the developer:
The custom Southbridge silicon, responsive for background downloads while main SoC is off, didn’t help to secure Playstation 4. We explain how a chain of exploits combined with hardware attacks will allow code to run in the context of the secure bootloader, extract private keys, and sign a custom kernel.
Posted:
Related Forum: PlayStation Forum
Source: http://wololo.net/2018/02/05/ps4-rest-mode-exploit-revealed-vpikhur-5-xx-firmware/
"PS4 Rest mode exploit revealed (5.xx firmware)" :: Login/Create an Account :: 23 comments