Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

stuck on STAGE 0 at Target IPv6 message #204

Open
stilyan opened this issue Nov 22, 2024 · 0 comments
Open

stuck on STAGE 0 at Target IPv6 message #204

stilyan opened this issue Nov 22, 2024 · 0 comments

Comments

@stilyan
Copy link

stilyan commented Nov 22, 2024

PS4 Pro 9.60
Raspberry PI B 512MB RAM
put image of Raspberry Pi OS Lite bookworm on SD and then followed the guide from README
the PI is only connected to the ps4 via ethernet, nowhere else

config

#!/bin/bash
INTERFACE="eth0" 
FIRMWAREVERSION="9.60" 
SHUTDOWN=true
USBETHERNET=false
PPPOECONN=false
VMUSB=false
DTLINK=true
RESTMODE=true
PPDBG=true
TIMEOUT="3m"
PYPWN=true
LEDACT="normal"
DDNS=false
OIPV=false
UGH=true

OIPV=false
as for that, documentation could be improved, I found out what the flag truly means here
when set to false the latest IPV6 address it should resolve incompatibility with some consoles
so I did but the process still hangs before the heap

log

[+] STAGE 0: Initialization
[*] Waiting for PADI...
[+] pppoe_softc: 0xffff9200304eb600
[+] Target MAC: 2c:cc:44:d7:86:37
[+] Source MAC: 07:b6:4e:30:00:92
[+] AC cookie length: 0x4e0
[*] Sending PADO...
[*] Waiting for PADR...
[*] Sending PADS...
[*] Sending LCP configure request...
[*] Waiting for LCP configure ACK...
[*] Waiting for LCP configure request...
[*] Sending LCP configure ACK...
[*] Sending IPCP configure request...
[*] Waiting for IPCP configure ACK...
[*] Waiting for IPCP configure request...
[*] Sending IPCP configure NAK...
[*] Waiting for IPCP configure request...
[*] Sending IPCP configure ACK...
[*] Waiting for interface to be ready...
[+] Target IPv6: fe80::2ecc:44ff:fed7:8637
[+] PPPwn - PlayStation 4 PPPoE RCE by theflow
[+] args: interface=eth0 fw=960 ipv=fe80::9f9f:41ff:9f9f:41ff gh=1

[+] STAGE 0: Initialization
[*] Waiting for PADI...
[+] pppoe_softc: 0xffffdab707e22200
[+] Target MAC: 2c:cc:44:d7:86:37
[+] Source MAC: 07:22:e2:07:b7:da
[+] AC cookie length: 0x4e0
[*] Sending PADO...
[*] Waiting for PADR...
[*] Sending PADS...
[*] Sending LCP configure request...
[*] Waiting for LCP configure ACK...
[*] Waiting for LCP configure request...
[*] Sending LCP configure ACK...
[*] Sending IPCP configure request...
[*] Waiting for IPCP configure ACK...
[*] Waiting for IPCP configure request...
[*] Sending IPCP configure NAK...
[*] Waiting for IPCP configure request...
[*] Sending IPCP configure ACK...
[*] Waiting for interface to be ready...
[+] Target IPv6: fe80::2ecc:44ff:fed7:8637

I do not understand what this address Target IPv6: fe80::2ecc:44ff:fed7:8637 is
since I've opted it to use fe80::9f9f:41ff:9f9f:41ff

in any case, any info on how to proceed further in the process is appreciated

successfully pppwned the console via ubuntu vm and build (as per readme) of the flow's python exploit

of all the attempts I did while getting a successful setup not once did the execution got stuck right before the heap like it does with the raspberry pi setup

could it be ram limit? because my pi has only 512
I don't see it among supported in README but the ZERO is and it has 512 as well

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant