Info/FAQ
HB Store locks up my console!
This is a known issue when loading payloads through Mira Loader. I tried using an alternate method to launch
payloads, but it caused more obvious issues. If you want to use the HB Store,
load GoldHEN with the bin loader or download packages from pkg-zone.com and install them manually.
Should I update to firmware X?
9.00 has a higher success rate, but requires connecting a specially-formatted USB drive to trigger the exploit.
If you're okay with this and have a spare flash drive, update to 9.00.
Firmwares higher than 9.00 cannot be exploited.
Do I really need to restart after each failure?
- If you get an "out of memory" error, click OK. This error will not harm your console.
- If you get any other error, restart.
- If you get "failed to find slave" enjoy your kernel panic.
- If you keep getting OOM, back out of the browser and open the settings menu, then go back to the browser.
-This causes the webkit process to restart. Alternatively, power off completely and try again.
- Powering off completely seems work better for me than restarting. This is based purely on my experience, your mileage may vary.
Whats X in the debug settings?
If you don't know what something does, you don't need it and shouldn't touch it.
In fact, stay out of the debug settings. Everything you need (the package installer) is in GoldHEN settings.
How can I make the browser open on this page?
- Use Al Azif's DNS: 165.227.83.145 and 192.241.221.79 (you really should use this all the time because it blocks PSN)
- This makes the browser homepage and user guide redirect to Al Azif's exploit host
- Press L2 and enter
https://lesking72.github.io/ps4/redirect.js
in the "Custom JS URL" field
- Click submit, then refresh the page
I have other questions/comments/hate mail
Miscellaneous Tips
- Custom fan thresholds persist until the power is disconnected; even across cold boots.
- The dummy folders created by Disable Updates may get deleted after kernel panics.
- GoldHEN creates the aforementioned folders when it starts.
- The self-host zip is here.
Credits:
For this host:
Sleirsgoevy - Exploit, Mira & Linux payloads
SiSTRo - GoldHEN
Al Azif - Utility payloads
For the exploit in general:
Synacktiv - WebKit exploit, Sleirsgoevy ported it to 7.0x
Andy Nguyen - Kernel exploit
tihmstar - 7.02 offsets in the Linux loader
This host previously used work by ChendoChap and Znullptr