Dumper to dump/extract files required by PCSX4 from an actual PlayStation 4 console. The dumper currently supports PS4 FW ver 1.76, 4.55, 5.00, 5.05.
Visit pcsx4.com for web version or rut it from here.
-
Connect your computer and PS4 to the same network.
-
Setup ps4-payload-sdk.
-
Before building, change the IP address (
#define BLOBS_ADDR IP(192,168,2,1)
) found insidesource/blob.c
to the IP adress of the pc where theserver.py
will be running. -
Build the payload for your firmware version with
make
. Pick one of the following supported firmware versions: 1.76, 4.55, 5.00, 5.05. For example:make 5.00
-
Start the server with:
python server.py
-
Enter your computer's IP address in the PlayStation 4 web browser and follow the instructions on screen. The exploit provided by
server.py
only works for firmware 5.00. If you are on a different firmware you need to run an exploit manually and send the dumper payload using netcat/socat:
socat -u FILE:dumper.bin TCP:"PS4 IP":9020
This dumper requires an exploit that listens for payloads in binary format on port 9020
. These payloads need to be mapped as follows in user address space:
0x926200000
: Code (can be changed inMakefile
)0x926300000
: Data (can be changed inMakefile
)0x926400000
: Arguments (can be changed insource/main.c
)
Furthermore, the server will listen at port 9021
for incoming blobs, and optionally at 9022
for debug messages.
If you want to add support for a new FW, use one of the source/ksdk_XXX.inc
as template and update the required offset to match that of your FW.
Thanks to: flatz, idc, m0rph3us1987, masterzorag, wildcard, x41, zecoxao, zer0xff, z80.