This is an experimental jailbreak for PS4 11.00 or lower based on TheFloW proof-of-concept exploit. This jailbreak is under development and does not working yet.
Same as TheFloW proof-of-concept, except Python and GCC are not required.
You need to connect the PS4 and the computer with an Ethernet cable without any Ethernet switch in the middle.
Run the following command on the computer that connected with the PS4 to find the index of connected port:
ip linkIt will output something like:
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
2: enp3s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000
link/ether ??:??:??:??:??:?? brd ff:ff:ff:ff:ff:ff
My computer has only one Ethernet so 2 is an obvious index for me. Once figure out run the following command:
sudo ./jailbreak-11 INDEXReplace INDEX with the Ethernet index then open the PS4 and go to Settings > Network > Set Up Internet Connection > Use a LAN Cable > Custom > PPPoE. Enter a random PPPoE User ID and PPPoE Password.
- Rust on the latest stable channel
rustup target add x86_64-unknown-nonecargo install cargo-binutilsrustup component add llvm-toolscargo objcopy -p payload --target x86_64-unknown-none --release -- -O binary payload.bincargo buildAfter this you can follow the instructions on the Running section by changing the ./jailbreak-11 to ./target/debug/jailbreak-11.
MIT