Skip to content

Instantly share code, notes, and snippets.

@Al-Azif Al-Azif/README.md Secret
Last active Apr 3, 2019

Embed
What would you like to do?
  1. Have a fresh install of Raspiban Lite on your RPi

  2. Connect you RPi to a network with internet access

  3. Run this command on you RPi:

     curl -L https://git.io/vh1he | sudo bash -s
    
  4. Your device will restart automatically

  5. Connect your PS4 to the wireless network PS4-Exploit-Host (Use easy mode, not custom)

  6. Load the User's Manual

  • I recommend changing your password on the pi as SSH is enabled and the network is open

    Run sudo passwd pi and it'll ask you for a new password.

  • You can easily change wlan0 to eth0 and disable hostapd to run over a cord rather than wifi.

  • Expect this to be a temporary install until the full version is complete.

#!/bin/bash
apt-get update
apt-get -y upgrade
curl -L https://github.com/Al-Azif/ps4-exploit-host/releases/download/v0.4.5/ps4-exploit-host-linux.arm-v0.4.5.zip --output /opt/ps4-exploit-host-linux.arm.zip
apt-get -y install hostapd dnsmasq
systemctl stop dhcpcd
systemctl stop dnsmasq
systemctl stop hostapd
cat << 'EOF' >> /etc/dhcpcd.conf
interface wlan0
static ip_address=192.168.1.1/24
denyinterfaces wlan0
EOF
cat << 'EOF' > /etc/dnsmasq.conf
# Disable DNS (We're using this for DHCP only)
port=0
# Disable resolv.conf and hosts File
no-resolv
no-hosts
# Filter Local Queries
domain-needed
bogus-priv
# Bind to wlan0
interface=wlan0
bind-interfaces
# Set Default Gateway for DHCP
dhcp-option=3,192.168.1.1
# Set Default DNS for DHCP
dhcp-option=6,192.168.1.1,192.168.1.1
# Specify IP Range
dhcp-range=192.168.1.2,192.168.1.254,255.255.255.0,2h
# Set Authoritative Mode
dhcp-authoritative
EOF
cat << 'EOF' > /etc/hostapd/hostapd.conf
interface=wlan0
driver=nl80211
ssid=PS4-Exploit-Host
hw_mode=g
channel=6
ieee80211n=1
wmm_enabled=1
ht_capab=[HT40][SHORT-GI-20][DSSS_CCK-40]
macaddr_acl=0
auth_algs=1
EOF
sed -i -- 's/#DAEMON_CONF=""/DAEMON_CONF="\/etc\/hostapd\/hostapd.conf"/g' /etc/default/hostapd
unzip -d /opt/ /opt/ps4-exploit-host-linux.arm.zip
rm /opt/ps4-exploit-host-linux.arm.zip
sed -i -- 's/"Interface_IP": ""/"Interface_IP": "192.168.1.1"/g' /opt/ps4-exploit-host/settings.json
cat << 'EOF' >> /opt/ps4-exploit-host/ps4-exploit-host.service
[Unit]
Description=PS4 Exploit Host
Wants=multi-user.target
[Service]
Type=simple
Restart=always
RestartSec=10
User=root
Group=root
WorkingDirectory=/opt/ps4-exploit-host
ExecStart=/opt/ps4-exploit-host/ps4-exploit-host
KillMode=process
[Install]
WantedBy=multi-user.target
EOF
chmod +x /opt/ps4-exploit-host/ps4-exploit-host
ln -f /opt/ps4-exploit-host/ps4-exploit-host.service /lib/systemd/system/ps4-exploit-host.service
systemctl enable ssh
systemctl enable dhcpcd
systemctl enable dnsmasq
systemctl enable hostapd
systemctl enable ps4-exploit-host
reboot
@corsasri

This comment has been minimized.

Copy link

commented Feb 11, 2018

Would be good to get a working image. For pi zero with a wifi dongle connected.

@Al-Azif

This comment has been minimized.

Copy link
Owner Author

commented Feb 11, 2018

Yeah, once I get the web control interface working I'll work on getting prebuilt images.

@corsasri

This comment has been minimized.

Copy link

commented Feb 11, 2018

Thanks for the effort.

@bibi32

This comment has been minimized.

Copy link

commented Mar 16, 2018

For rpi3 could you have routing and masquerade to wlan0 to eth0 please??

@usb2

This comment has been minimized.

Copy link

commented Apr 22, 2018

Thanks a lot !!
It's working like a charm on my RPi 2 with a wifi dongle.

@VersatileNinja

This comment has been minimized.

Copy link

commented Apr 27, 2018

Does this work on raspberry pi zero w? After it restarts, I do not see the wifi network...

@daschewie

This comment has been minimized.

Copy link

commented May 4, 2018

I have installed this on a PI 3 using the latest Raspian Stretch Lite image, and don't see the Wifi Access Point.

@boypuro

This comment has been minimized.

Copy link

commented May 14, 2018

i also don't see the Wifi Access point "Ps4-exploit-host". :( :(

@garsia0

This comment has been minimized.

Copy link

commented Apr 2, 2019

Working in Current vercion RPI3 02/04/2019

Enable SSH
systemctl enable ssh
sed -i -- 's/#PermitRootLogin prohibit-password/PermitRootLogin yes/g' /etc/ssh/sshd_config
/etc/init.d/ssh restart

sudo apt-get update
apt-get -y upgrade
apt-get -y install hostapd dnsmasq
systemctl unmask hostapd
systemctl stop dnsmasq
systemctl stop hostapd

cat << 'EOF' >> /etc/dhcpcd.conf
interface wlan0
static ip_address=192.168.4.1/24
nohook wpa_supplicant
EOF

sudo mv /etc/dnsmasq.conf /etc/dnsmasq.conf.orig

cat << 'EOF' > /etc/dnsmasq.conf

Disable DNS (We're using this for DHCP only)

port=0

Disable resolv.conf and hosts File

no-resolv
no-hosts

Filter Local Queries

domain-needed
bogus-priv

Set Authoritative Mode

dhcp-authoritative

Use the require wireless interface - usually wlan0

interface=wlan0

Specify IP Range

dhcp-range=192.168.4.2,192.168.4.20,255.255.255.0,24h

Set Default DNS for DHCP

dhcp-option=6,192.168.4.1,192.168.4.1

Set Default Gateway for DHCP

dhcp-option=3,192.168.4.1

EOF

cat << 'EOF' > /etc/hostapd/hostapd.conf
interface=wlan0
driver=nl80211
ssid=PS4-Exploit-Host
hw_mode=g
channel=7
wmm_enabled=0
macaddr_acl=0
auth_algs=1
ignore_broadcast_ssid=0
wpa=2

Password Host AP

wpa_passphrase=123456789
wpa_key_mgmt=WPA-PSK
wpa_pairwise=TKIP
rsn_pairwise=CCMP
EOF

sed -i -- 's/#DAEMON_CONF=""/DAEMON_CONF="/etc/hostapd/hostapd.conf"/g' /etc/default/hostapd

sudo systemctl enable hostapd
sudo systemctl enable dnsmasq
sudo systemctl start hostapd
sudo systemctl start dnsmasq
sudo service dhcpcd restart

############################################PS4

curl -L https://github.com/Al-Azif/ps4-exploit-host/releases/download/v0.4.5/ps4-exploit-host-linux.arm-v0.4.5.zip --output /opt/ps4-exploit-host-linux.arm.zip
unzip -d /opt/ /opt/ps4-exploit-host-linux.arm.zip
rm /opt/ps4-exploit-host-linux.arm.zip
sed -i -- 's/"Interface_IP": ""/"Interface_IP": "192.168.4.1"/g' /opt/ps4-exploit-host/settings.json

cat << 'EOF' >> /opt/ps4-exploit-host/ps4-exploit-host.service
[Unit]
Description=PS4 Exploit Host
Wants=multi-user.target

[Service]
Type=simple
Restart=always
RestartSec=10
User=root
Group=root
WorkingDirectory=/opt/ps4-exploit-host
ExecStart=/opt/ps4-exploit-host/ps4-exploit-host
KillMode=process

[Install]
WantedBy=multi-user.target
EOF

chmod +x /opt/ps4-exploit-host/ps4-exploit-host
ln -f /opt/ps4-exploit-host/ps4-exploit-host.service /lib/systemd/system/ps4-exploit-host.service

systemctl enable ps4-exploit-host
systemctl start ps4-exploit-host

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.