15w ago - Following up on the PS Vita Firmware 2.60 update, today Sony announced that mandatory PS Vita System Software update v2.61 is incoming (which blocks the VHBL Arcade Darts exploit) with details available below.
37w ago - Following up on the previous hint, this weekend the Apache Overkill (PSP Mini) user mode exploit by TomTomdu80 for PS Vita Firmware 2.06 has been officially unveiled alongside a video demo below.
To quote: In this Video you can see a PS Vita with the Firmware 2.06, which runs the Vita Half Byte Loader via the Exploit game Apache Overkill. Thank you very much TomTomdu80 for this user mode exploit
This port of the Half Byte Loader for the PS Vita is capable of running Homebrews at the PS Vita Firmware 2.06 and older. This CAN NOT run ISO or CSO games. Plugins (PRX) wont work either! Just usermode Homebrews!
From Wololo: Disclaimer: I haven’t tested this VHBL version myself. People who tested it in EU/US version have told me this VHBL compatibility is below average, but compatibility may increase in future releases. As usual, the choice is yours.
Another long wait is over, this is the public announce for the game exploit that will let people run TomTomDu80′s port of VHBL on Vita firmware 2.06. Once again,...
41w ago - Sony President and CEO Jack Tretton has cordially welcomed fans to PlayStation Meeting 2013: The Future of Gaming with PlayStation 4 today!
Below are the details, as follows: Today is an exciting day for gamers everywhere.
As you may have seen live with millions of others across the world, just moments ago we introduced PlayStation 4 (PS4), our next-generation console that will deliver breakthrough gaming experiences for our fans starting this holiday season.
PlayStation 4 is centered on all of you - the gamers. It redefines rich and immersive gameplay with powerful graphics and speed, intelligent personalization, deeply integrated social capabilities, and innovative second-screen features.
When we designed PlayStation 4, we focused on building an architecture that will allow the greatest game developers in the industry to push boundaries and dig deep within their imaginations to create the most immersive and unique games for you to enjoy.
The future of PlayStation is all about great games and entertainment, and at PlayStation Meeting 2013, we brought some of the brightest and most creative minds from the development community on stage to unveil the games that will define PS4.
A partial initial lineup for PlayStation 4 includes first-party games...
63w ago - Previously we reported that VHBL was running via a Monster Hunter Freedom Unite exploit on PlayStation Vita Firmware 1.80, followed by Sony patching it in v1.81 with wololo back this weekend demonstrating a new game exploit running VHBL once again on PS Vita Firmware 1.81.
The video shows VHBL running Wagic (Magic the Gathering simulation) and gPSP (a GBA Emulator), however, once the new game exploit is publicly disclosed Sony will likely release another PS Vita Firmware update in order to resecure their handheld console once again.
Below is the video, and to quote from wololo's blog:
Latest Sony firmware 1.81 patches the Monster hunter exploit, but as usual, Sony has been kind enough to only patch that specific game, and not prevent VHBL itself from running. The video below shows VHBL running on firmware 1.81.
This is VHBL running on an undisclosed game exploit on firmware 1.81. In the video, I'm showing VHBL running Wagic, as well as Game Boy Advance's "Advanced Wars 2″ running through the GBA Emulator gPSP. Those of you with a good...
63w ago - Following up on his PS3 SCETool update and PS3 Dump_Rootkey code, today Sony PlayStation 3 hacker Naehrwert has posted some details on exploiting the PlayStation 3 lv2_kernel and has made available a sample 3.41 implementation below.
To quote from his blog: Exploiting (?) lv2
A long while ago KaKaRoTo pointed me to a stack overflow he found while reversing lv2_kernel. But there are two problems:
1. The vulnerability is in a protected syscall (the SELF calling it got to have the 0x40... control flags set). So you’d first need to find a suitable usermode exploit (don’t ask us), that gives you code execution with the right privileges.
2. The payload data is copied to lv2 heap first and the function will do a free call on it before the payload has any chance to get executed. This might not sound like a problem but it looks like lv2′s heap implementation will overwrite the free’ed space with 0xABADCAFE and thus destroy the payload.
Here (pastie.org/4755699) is my sample implementation for 3.41 lv2_kernel...