You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+7-7Lines changed: 7 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ A WebServer+Wifi Repeater+Fake DNS Server to Host PS4/PS5 Exploits on ESP8266
6
6
7
7
8
8
## Details and usage
9
-
This is an implementation of a barebones webServer to Host PS4/PS5 Exploits on an ESP86, that also acts as a Wifi Repeater to maintain internet access for the console. This tool has the following features:
9
+
This is an implementation of a barebones webServer to Host PS4/PS5 Exploits on an ESP8266, that also acts as a Wifi Repeater to maintain internet access for the console. This tool has the following features:
10
10
- Basic Webserver to host PS4 and PS5 exploits (including limited support for HTTPS to handle the PS5)
11
11
- FakeDNS that redirects playstation.net (user guides) to the web server, and blocks other playstation addresses
12
12
- The Access Point acts as a Wifi Repeater so that the clients (PS4, PS5, PC) can still access the internet for domains that are not blocked/redirected by the DNS
@@ -52,7 +52,7 @@ In other words, it's a self contained solution to run the PS4/PS5 exploits while
52
52
- Set up your console's Network Settings to connect via Wifi, using your ESP8266 Access point ("PS5_WEB_AP" by default, and password "password")
53
53
- On PS4 or PS5, go to Settings > User's Guide > User's Guide, this should load the exploit page.
54
54
55
-
There are a bunch of tutorials on how to run these out there, once ths host is set up it is no different from others, except for the fact that it allows the console to access internet
55
+
There are a bunch of tutorials on how to run these out there, once the host is set up it is no different from others, except for the fact that it allows the console to access internet
56
56
57
57
#### Notes
58
58
- If you want/need to get everything back offline like "other" ESP8266 Hosts, go back to 10.1.1.1/admin.html, set "ENABLE WIFI" to 0, then save the config again.
@@ -72,7 +72,7 @@ There are a bunch of tutorials on how to run these out there, once ths host is s
72
72
73
73
## FAQ and Troubleshooting
74
74
### How good is the FakeDNS?
75
-
It's a very rough design that just looks for some specific domain names (currently hardcoded inside the main source file) and either redirect those to the local ESP WebServer (namely playstation.net, where the user guides are hosted), or blocks them (other kwnonw PlayStation telemetry domains). Just because the DNS suggests that these domains should be redirect or blocked, doesn't mean the client device can't do whatever they like. In the case of the PS4 and PS5, this seems to be enough, but I can't guarantee that the console isn't bypassing DNS replies, and (for example) asks another DNS on the Network. I can imagine this would be technically doable now that the ESP86 opens Internet access.
75
+
It's a very rough design that just looks for some specific domain names (currently hardcoded inside the main source file) and either redirect those to the local ESP WebServer (namely playstation.net, where the user guides are hosted), or blocks them (other kwnonw PlayStation telemetry domains). Just because the DNS suggests that these domains should be redirect or blocked, doesn't mean the client device can't do whatever they like. In the case of the PS4 and PS5, this seems to be enough, but I can't guarantee that the console isn't bypassing DNS replies, and (for example) asks another DNS on the Network. I can imagine this would be technically doable now that the ESP8266 opens Internet access.
76
76
77
77
Furthermore, there's no support for regexps at the moment so it's really a simple string check in its current state.
78
78
@@ -81,14 +81,14 @@ If you get some "Error Connection close" when testing https://10.1.1.1 (local HT
81
81
82
82
## Technical thoughts and stuff
83
83
### Why
84
-
Multiple versions of the ESP8266 Hosts exist to host PS4/PS5 exploits, for the most part based on work by Stooged (https://github.com/stooged/). To my knowledge however, none of them allow the clients (PS4, PS5, or the PC that you inevitably want to connect to them) to access Internet. The Access Point is generally stuck as a "Local Network" provider. This is enough to provide basic exploit access to the console, but there might be cases where we want to maintain Internet access anyway.
85
-
86
-
Most people achieve that by using a "Fake DNS" and either hosting the exploit locally on their PC ( https://wololo.net/2022/10/04/tutorial-running-the-ps5-4-03-exploit-on-windows-with-additional-dns-security-telemetry-blocking-etc/ ) or accessing one of the many "exploit hosts" online.
84
+
Multiple versions of the ESP8266 Hosts exist to host PS4/PS5 exploits, for the most part based on work by Stooged (https://github.com/stooged/). To my knowledge however, none of them allow the clients (PS4, PS5, or the PC that you inevitably want to connect to them) to access the Internet. The Access Point is generally stuck as a "Local Network" provider. This is enough to provide basic exploit access to the console (and it ensures you won't get an automatic firmware update for the console), but there might be cases where we want to maintain Internet access anyway.
87
85
86
+
Most people achieve that by using a "Fake DNS" and either hosting the exploit locally on their PC ( https://wololo.net/2022/10/04/tutorial-running-the-ps5-4-03-exploit-on-windows-with-additional-dns-security-telemetry-blocking-etc/ ) or accessing one of the many "exploit hosts" online. These solutions do not rely on ESP8266 whatsoever, or only as one element of a bigger solution (e.g; ESP8266 + Raspberry Pi).
87
+
88
88
Given that the ESP8266 is able to simultaneously act as an an Access Point AND connect to a Wifi Router, I assumed there had to be ways it could act as a self contained Web Server + Fake DNS + Wifi Repeater, to mimic the other solutions. Turns out it is possible, with some limitations.
89
89
90
90
### Technical considerations
91
-
There are samples showing us how to run an HTTPS WebServer on ESP8266, how to block specific domain names with some ad-blocking DNS, how to enable NAT to use th device as a Wifi Repeater. There wasn't any example of how these things are all put together, so I guess this is now it.
91
+
There are samples showing us how to run an HTTPS WebServer on ESP8266, how to block specific domain names with some ad-blocking DNS, how to enable NAT to use the device as a Wifi Repeater. There wasn't any example of how these things are all put together, so I guess this is now it.
92
92
Technically speaking, putting all these components together isn't particularly hard: The HTTP and HTTPS WebServer, including their content (exploits-related redirections, webAdmin) were takend from projects by [Stooged](https://github.com/stooged), which are widely used in the PS4/PS5 scene on multiple variations of the ESP8266 Hosts. The Default DNS Server however, is designed in a way that it will redirect all traffic to the AP Host (or that's how I understood it at least), so I replaced it with a modified version by [Rubfi](https://github.com/rubfi) which did more or less what I wanted. Last but not least, "Wifi Repeater" samples were available (technically, NAT routing) e.g. at https://github.com/AliBigdeli/Arduino-ESP8266-Repeater.
0 commit comments