From 4bba71b8e773032f67242de62fc947d0aa721028 Mon Sep 17 00:00:00 2001
From: CrazeeGhost <21267479+CrazeeGhost@users.noreply.github.com>
Date: Thu, 14 Nov 2024 10:20:14 -0500
Subject: [PATCH] Update README.md
---
README.md | 62 ++++++++++++++++++++++++++++++++++++++++++++++++++++++-
1 file changed, 61 insertions(+), 1 deletion(-)
diff --git a/README.md b/README.md
index 0f80c3c..d77d637 100644
--- a/README.md
+++ b/README.md
@@ -1 +1,61 @@
-# See Notes on individual releases
+## Local PS4 9.00 Jailbreak Host with USB emulation
+This project is aimed at setting up a local web host, with USB emulation, on select Raspberry Pi boards that can be used to exploit and jailbreak PS4 consoles running firmware version 9.00. Raspberry Pi Zero W / Pi Zero 2 W / Pi4 B are eligible boards as they support a USB on-the-go (OTG) gadget mode and eliminate the need to manually insert and remove the USB stick required in the exploit process. This project is implemented on a clean Raspberry Pi OS (Debian) install which makes it easier to repurpose the Pi to run additional applications and services on it.
+Developed and Tested on Raspberry Pi 4 B but should work on Pi Zero W / Pi Zero 2 W / Pi4 B
+
+### Benefits
+- Clean Raspberry Pi OS install - easy to setup the Pi for other purposes as you desire
+- Easily update exploit, GoldHen and payload files from the web interface
+- One device for local web server and USB emulation
+- One USB cable is sufficient to power the Pi and emulate USB
+- You can leave the Pi permanently connected to the PS4. No need not to remove and plug in a USB stick to run explolit
+
+### Setup - Easy Method
+1. Write the image provided in the releases to an SD card (using program like Pi Imager or Rufus)
+2. Insert the SD card into the Raspberry Pi
+3. Optional - If you want to use a different GoldHen version, copy the desired goldhen payload to `/boot/payloads/goldhen.bin`
+4. For Pi Zero W & Pi Zero 2W, connect the USB marked Pi USB port to PS4. Be sure to use a cable that supports data transfer
+ ![image](https://user-images.githubusercontent.com/2664857/149229582-18780783-6d47-4d12-89ab-1898da33e1c7.png)
+5. For Pi4 B, connect a USB C cable from Pi to PS4
+6. For wired connection, use an ethernet cable to connect the Pi to your internet router
+7. Power up the PS4. This should also boot up your Pi
+8. Use `raspi-config` to expand the filesystem to the capacity of your SD card
+9. Use `raspi-config` to connect Pi to your wireless network (if you didn't setup a wired connection in step 5)
+10. For SSH access, username is `pi` and password is `ps4free`
+
+### Setup - Advanced Method
+1. Install a clean Raspberry Pi OS image to an SD card (Developed and tested on Debian Bullseye)
+2. Enable USB Gadget Mode on the Pi
+ a. Add `dtoverlay=dwc2,dr_mode=peripheral` to the `[all]` section inside `/boot/config.txt`
+3. Prevent the Pi from automatically becoming a USB gadget on every boot
+ a. Add `sudo /sbin/modprobe -r g_mass_storage` to `/etc/rc.local`
+5. Install and setup `lighttpd` and `PHP`
+6. Enable fast cgi module for lighttpd
+ a. `sudo lighttpd-enable-mod fastcgi fastcgi-php`
+ b. `sudo systemctl reload lighttpd.service`
+8. Configure `/var/www/html/ps4` as the document root directory for the exploit app (via `lighttpd` configs)
+9. Clone or download the source code from this repo
+ a. `cd /home/pi`
+ b. `git clone -b webkit --single-branch https://github.com/CrazeeGhost/PS4JbEmu.git`
+ c. `sudo git config --system --add safe.directory /home/pi/PS4JbEmu`
+10. Allow the webserver user to run modprobe as root without password
+ a. Add `www-data ALL=(ALL) NOPASSWD: /sbin/modprobe` to your sudoers file using the `visudo` command
+11. Make the web app accessible to the webserver (will not work if you did not follow the directory strcture in step 8)
+ b. `sudo chmod 755 /home/pi/PS4JbEmu/updateHost.sh`
+ c. `sudo /home/pi/PS4JbEmu/updateHost.sh`
+12. (Optional) Enable auto-updates via cron
+ a. `sudo crontab -e`
+ b. `*/30 * * * * /home/pi/PS4JbEmu/updateHost.sh`
+
+### Running the exploit / jailbreak
+1. On the PS4 go to Browser and visit http:///ps4
+2. Click on the GoldHen button for the version you want to exploit with
+ a. A popup will be thrown saying USB emulation started and wait for ps4 pop up
+ ![image](https://user-images.githubusercontent.com/20742243/151671687-3a16a6db-a56e-45d8-bc13-9ff76598949d.png)
+ b. Once the USB message disappears, Click ok
+ c. GoldHen will load automatically
+
+### Credits
+1. Kameleonre_ - Porting PSFree Exploit
+2. Sleirsgoevy – Webkit, Offline Activator
+3. Chendochap – KeExploit
+5. PaulJenkin – Inspiration for USB Emulation