Skip to playerSkip to main content
  • 2 days ago
Gezine releases a new blu-ray exploit supporting firmwares up to 12.50!

Support Gezine: https://buymeacoffee.com/gezine
--------------------------------------------------------------------------------------------------------
Links:

BD-JB 12.50: https://github.com/Gezine/BD-JB-1250

ImgBurn: https://www.imgburn.com/index.php?act...

socat windows: https://github.com/tech128/socat-1.7....

--------------------------------------------------------------------------------------------------------
Music
Outro: Paul Flint - Sock It To Them - • Paul Flint - Sock It To Them [NCS Release]
--------------------------------------------------------------------------------------------------------
Find my content on these other platforms:
Odysee: https://odysee.com/@MODDEDWARFARE
LBRY: https://lbry.tv/@MODDEDWARFARE
BitChute: https://www.bitchute.com/channel/cZkN...
Transcript
00:00Hey, how's it going guys? Welcome back to another PS4 video. So already we have a big update
00:04to the Blu-ray Drive exploit, which is actually a release of the Blu-ray Drive exploit. If you
00:10don't know what this is, I recommend checking my previous video where I did a whole kind of
00:14news update primarily talking about this new Blu-ray exploit that was discovered by developer
00:20Gezin, who has come up with at least a couple of Blu-ray exploits at this point. So what we can see
00:28here is that we have this new release here from the developer BDJ up to 12.50. So it says BDJ
00:34for up to PS4 firmwares 12.50. Originally it said that this might be the exploit that was reported
00:40by the Flow, which was then patched in 12.52. But since then it's been updated to say that actually
00:46no, the Flow just confirmed that this is not his exploit. So just take my early Christmas gift and
00:52no, this will not work on the PS5. So this is for PS4 only. So this is a user land exploit that
00:58can be triggered from the Blu-ray Drive, which can be used to of course jailbreak the PS4 up to 12.02
01:03when it is eventually combined with the lapped kernel exploits, which probably won't take too long
01:10because it does look like a pretty fully featured Blu-ray exploit in its current state. So this is some
01:16pretty exciting news here. Now what's interesting about this in my last video, I said the new Blu-ray
01:21exploits that this developer discovered, it apparently works on all firmwares. So it would actually be
01:26better for them not to release that new version and keep that private for future jailbreaks. And
01:31instead, hopefully we get the Flows exploit, which is likely to be patched in 12.52 already. So that
01:37would be the better one to get released because we could use that one to jailbreak up to 12.02 with
01:42the current jailbreaks and then save the one that works on higher firmwares for future jailbreaks.
01:46That would be the best situation. And that seems to be the situation because this version is not the
01:50version that works on all firmwares like the new one. This is the one that works up to 12.50.
01:55Now the developer here did state earlier that I covered in the previous video that they thought
02:00they knew what the Flows exploit was as well. So they had their own Blu-ray exploit that works on
02:06all firmwares, but they also thought they had an idea of what the Flows exploit was actually using.
02:11And that's the version that they've released here in this GitHub release that works up to 12.50
02:17and is likely patched in 12.52, but we'll test that. But it turns out they were actually wrong about
02:23that being the same exploit that the Flow discovered because the Flow confirmed that that's not his
02:29exploit. So that could mean that there's actually three potential Blu-ray exploits. This one that's
02:34been released, the one that works on all firmwares that's not been released yet, and of course the
02:39Flows one as well. So there could be potentially three at this point. Who knows? It's getting a
02:44little bit crazy. So at the moment this is just a user land exploit on its own. It's not been chained
02:49with the lapse kernel exploits yet to run the jailbreak, although I suspect we will see that
02:54fairly soon. So all we've got at the moment is this hello world notification. That's all the ISO
02:59does at the moment is print a notification on screen to show it's working. So all you do is download the
03:05ISO file, write it to a disk by burning it via a program like image burn. You just select the option
03:10to write image file to disk, drag in the ISO into the software, put in a blank Blu-ray disk. And yes,
03:16it does need to be a Blu-ray disk and not a CD or DVD, and then simply burn it to the disk if you have
03:22a Blu-ray burner. And that is how you get that on there. And then once you have that written to the
03:27disk, you can put it into your PlayStation 4. Now you can also get the remote logging working as it
03:32states here. You can change the status.java file in the ISO and then edit the IP address to, you know,
03:39your computer's IP address. Rather than do that though, I just went ahead and set my computer's IP
03:44address to the same IP as the default one, which is 192.168.2.1, just by opening up the network
03:51connections here on my computer, right clicking on my Ethernet adapter, going to properties,
03:55and then of course setting the Internet Protocol version 4 address to the same default address,
04:00192.168.2.1, setting the subnet mask, and then basically doing the same thing on the PS4 in the
04:07network settings and setting its IP address to 192.168.2.2, just so that they can communicate with each
04:13other and they have the same IPs. And that way I'll be able to get the log without having to modify
04:18the ISO. So to give this a test run, I have SOCAT for Windows here. I'll leave this in the description
04:23along with the other stuff that I'm using. And we can get the log using this by entering this command
04:29dot forward slash SOCAT dot exe dash V for verbose mode, UDP dash receive, and then colon 18194,
04:37which is the port number for the logging, and then STD out. So once that is done, you are good. You can
04:43press enter, and that will be running. And now if I switch over to my console, we should be ready
04:49to load up this user land exploit. So this console is on firmware 12.02, as you can see here. So 12.02
04:57firmware. And what we'll do is we'll run the Blu-ray disk and see if we can get this user land
05:02exploits working. And then of course, we'll also test it on a 12.52 system and see if it has actually
05:07been patched on 12.52 or not. So let's go ahead and run this. So we'll run the Blu-ray disk.
05:15So we get a black screen. And then if I switch over to my desktop, you will be able to see
05:19the log. In fact, what I'll do is I'll just go back to the PS4 itself. So you can see the
05:25notification there, hello world. And if I go back to the computer, this is the log. As you can see,
05:30we've got triggering the sandbox escape exploit, disposing window, invoking create xlet, getting
05:37class loader. We've got disabling the security manager. Then the exploit succeeded and we got
05:43a sandbox escape achieved. And then it grabs the kernel send notification address. So it can actually
05:49send that notify message, which it then sends there, the hello world message. And then you can see
05:54we've got calling the function, the buffer address, the buffer size and function returned zero.
05:59So yeah, there we go. That is it. And obviously it's not loading anything yet because we don't
06:05actually have an exploit for it to load. We don't have a kernel exploit that it's loading right now.
06:09That will change fairly soon once we get the lapped kernel exploit being triggered with this.
06:15Okay, so now let's try a 12.52 system. Apparently this should only work up to 12.50. So theoretically
06:21it shouldn't work on 12.52, but let's go ahead and give it a try anyway and see what happens.
06:26So we'll launch the Blu-ray disc and I am also running the log here to see if we get any information
06:35pop up. So far nothing.
06:38Oh, yep. Okay. Well, it didn't work. We never got any notification on the console and let's see,
06:52we've got triggering sandbox escape exploit, disposing window, invoking create xlet. And
06:58then there is an error in init xlet access denied. Look at that access denied with the Java access
07:04control exception. So I guess that might be something to do with what Zeko discovered
07:08where he compared the Java security file and saw that there were additional packages that were
07:14protected in 12.52 that were not protected in previous firmwares. And it looks like that's why
07:21this doesn't work on 12.52 because as you can see, we get access denied with the Java security
07:27access control exception. So yeah, there you go. Doesn't work on 12.52, but apparently the developer
07:34Gazine has another Blu-ray exploit that works on all firmwares that is not yet released. And then
07:40that's the one that we might be able to use on future jailbreaks if a new jailbreak comes out for
07:4412.52. So yeah, very exciting that we now have a new Blu-ray drive exploit that can be used to load
07:50the existing jailbreaks without requiring a Lua game without those Japanese games that are
07:55unfortunately cost quite a lot of money or are out of stock and hard to get a hold of. It's going to
08:00be much easier to get Blu-ray discs, even if you don't have a Blu-ray burner or it's too expensive
08:05for you to get a Blu-ray burner. There'll be other people reselling discs that are already prepared
08:10and you could just get one of those instead. And yeah, we'll probably end up seeing something very
08:15similar to the Lua games with the auto Lua loader, but for the Blu-ray drive instead,
08:19where you just launch the Blu-ray disc and it runs everything for you. The full chain exploit
08:24with the lapsed kernel exploit and then closes the disc player automatically and you're back
08:28on the homepage with Gold Hen running. That would be the ideal situation. So hopefully we'll see that
08:33fairly soon. So anyway, that's going to do it for this one. Hope you guys enjoyed this video or found
08:37the information useful. If you did, please leave a like and subscribe. And once again, as always,
08:41I'll hopefully see you guys in the next one.
08:49I'll see you guys in the next one.
09:03Bye.
Be the first to comment
Add your comment

Recommended