As you have probably seen, a small PoC webkit exploit for 2.60 was released for the psvita. You can test your vita yourself by visiting the link here: http://lolhax.org/vita.htm
At first the exploit only supported 2.60, which happens to be the firmware my vita is on. The exploit now supports up-to version 3.18 and code execution demo with ROPTool will be shown over the next while.
Lets talk about how this all came to be. Thanks to a tweet from @yifanlu, news exploded onto the internet about this hack and what it means for the vita. Problem is, most of you don’t know what it means for the vita and franky, nor do I. I’ve been working with webkit for over 2 years now but there are many other brains behind the scenes doing work, which I would like to talk about.
First off, there is Codelion or @BBalling1. He is a strong driving force in a small development group that just struggled to gain momentum. People left, people lost interest. This guy managed to keep in the game and deserves as much credit as you give me. He even posted a description of the exploit on his twitter over a week ago, so make sure to follow him.
Secondly, there is Josh Axey @, another member of the group. As I said, people lost interest the group cohesion broke and people worked on their own. This guy also made use of the packetstorm webkit bug.
@Archaemic. I haven’t spoken to this guy, but I can take yifan’s word that he has been working on the exploit for a long time and even has produced dumps from as early as April, goodjob man!
Thank you all for the praise, but I would like these guys to get a mention too, they are hardworkers and probably spent a lot of time on this bug too. If you’re interested in getting involved either drop me or any of these guys a tweet, I’m sure they’ll be glad to get a few extra devs.
I’ve done a post about Return Orientated Programming (ROP) before where I described basic operation of a ROP chain. The public domain of pentest security tools involving ROP is largely orientated around intel architecture x86. Now I have my own contribution to the security world.
Once again, I’ve not posted in a while, so I’ll start off my apologising for that. Today, I’m gonna talk about the reality of computer security. When I say reality, I immediately put my hands up and say that I’m talking bullshit and really just gonna spew a lot of my opinion in regards to computer security. So, here goes… (more…)
Today is a short post, but I’ve recently started playing around with ClipUpload. ClipUpload is a very clever, yet very simple clipboard upload tool which will upload whatever is in your clipboard to a variety of sources including: facebook, imgur, pastebin or even your own FTP server.
Whilst I think it is pretty cool to upload to an FTP server, I’d much rather have the ability for a secure transfer. That being said, I forked the code and with the help of SharpSSH I modified the FTP addon and produced a fully working SCP addon.
So, if you use clip upload, give it a try (especially if you prefer secure transfers). If not, you should give it a try, it’s a really useful application.
ClipUpload SCP Fork: https://github.com/DaveeFTW/ClipUpload
This will be a small introduction into return oriented programming, commonly referred to as ROP. I’ve had a lot of experience with security measures (duh) but never really had any hands on experience with more modern security technologies such as non-executable stack/data (DEP, NX, XN, W^X) or Address Space Layout Randomisation (ASLR).
The non-executable stack isn’t really limited to just the stack, anything that isn’t code memory can’t be executed. So as in PSP, you can’t just jump to the savedata and have the day’s work done. No, instead the only code executable is real code provided by the OS when binaries are loaded. This is a nice and funky way but ROP is the counter and tends to poop on this method.
Just to start, congratulation to yifanlu for his excellent work on gaining the first vita native hack. I’d like to note that I’m just relaying information from a forum post by yifanlu and did not have any input on yifanlu’s work, it’s all his!
Also, if you’re not a developer, please note that there is currently no way to run homebrew, colour your screen, download binaries, hack your device, make a milkshake from 10 miles away or such. This post is purely informational.
Continuing on, considering my audience gathers quite a few developers I think this post should complement the cause. So, if you don’t know, vita dev yifanlu has been looking around for developers who are interested in developing native software on the vita. He is calling out for developers to help him develop an ELF loader. (more…)
Well, this place has been cleaned up a little bit and I can log back in again. You might of noticed that I’ve changed the theme, and you’ll probably find out that I do this often!
Well this post is going summarise what the hell I’ve been doing since my last post in terms of development and perhaps you’ll be disappointed. Follow the link and find out! (more…)
Turns out he’s not just a green frog! So, I’ve been throwing this word around recently and it’s probably about time I explain. Kermit, either a protocol or perhaps a funny name (see KIRK/SPOCK) is a communication interface for the PSP emu. Specifically it allows the PSP to talk to the host.
Now, I can tell there aren’t as many developers here, so I’ll try to simplify for the curious minds but this stuff is pretty complicated. I’ll only explain the API in detail as the lower level still need a little bit of clearing up, but here goes. (more…)
First thing first, huge thanks to Proxima and some1. They’ve provided key utilities and advice for this research. So, yeah, it was really only a matter of time till this kind of thing happened. Sony dont just emulate the userland process of a PSP game, they emulate the entire kernel albeit, a modified kernel. The PSP emu has limited access to hardware, with interfacing the hardware done via a Kermit module. Kermit is a old-timers transmission protocol, likely used to talk to the native Vita. (more…)
Thanks to a facebook message from my dad yesterday, I was informed of this website: Can you Crack it?. So, promptly, I got onto the job and it was surprisingly easy and I imagine it will be for most people who can reverse engineer and has experience doing so.
Click read more to see how I did it, but I suggest you have a good attempt beforehand. It’s a nice little reverse engineering exercise.