exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Sony PlayStation Vita (PS Vita) - How To Find Savedata Exploits

Sony PlayStation Vita (PS Vita) - How To Find Savedata Exploits
Posted Aug 30, 2019
Authored by TheFloW

This is a brief whitepaper on how to find savedata exploits on Sony PlayStation Vita (PS Vita).

tags | paper
SHA-256 | 188612d0c7a2539a8f339aa1aea144f2e79cae8e31e8f935cf054251a5ed4586

Sony PlayStation Vita (PS Vita) - How To Find Savedata Exploits

Change Mirror Download
# How to find savedata exploits

Since the release of *h-encore* you might be wondering how such an user entry point is even possible. It is possible because games that were developed with an SDK around 3.00 and lower were compiled as a statically linked executable, thus its loading address is always the same and it cannot be relocated to an other region, which means that if we have an exploit in such a game, we can happily do ROP and don't need to deal with ASLR. They also don't have stack protection enabled by default, so stack smashing is the easiest way to trigger user ROP execution.
Savedata exploits are more powerful than WebKit exploits in terms of available syscalls. The reason for that is after firmware 3.30 or so, Sony introduced `sceKernelInhibitLoadingModule` in their browser, which prevented us from loading additional modules. This limitation is crucial, since this was the only to get syscalls, as they are randomized at boot.

*Note that the following guide is written for people with few knowledge about exploitation.*

How do we know that a game is a statically linked executable? They have got the value `0xFE00 ` for the `e_type` field in their ELF header. This is how you can see what type the executable has:

1. Choose any game you want to attempt exploiting ([List of DRM free games](https://wololo.net/talk/viewtopic.php?t=38342)).
2. Open the game in VitaShell using `Open decrypted`.
3. Click on the file `eboot.bin,` press triangle and select `Open hex editor`.
4. See what value is at offset `0xB0`:
- If it is `00 FE`, it is statically linked, hence it may be exploitable.
- If it is `04 FE`, it is dynamically linnked, hence is not exploitable due to ASLR.

If it is indeed a statically linked executable, you can now begin with fuzzing the savedata:

1. Download any hex editor.
2. Download and install [CrashDump Enabler](https://store.brewology.com/vita/ahomebrew.php?brewid=577).
3. Start your game and play it a little bit until you are sure that it has created a savedata.
4. Either use [vita-savemgr](https://github.com/d3m3vilurr/vita-savemgr) or VitaShell to export the savedata. If you use VitaShell, simply navigate to `ux0:user/00/savedata` and use `Open decrypted` on your game, then copy the savedata file out of the folder.
5. Connect your PS Vita to your computer and begin writing crap into the savedata file using your hex editor. Simply write alot of `a`'s at some points.
6. Copy the savedata back (again with `Open decrypted` if using VitaShell) and play the game.
7. Repeat this precedure until you get a crash. If the game complains that the savedata is invalid or so, then it is because there's a crc/hash check. In that case, you should give up, unless you know how to reverse engineer.

In case you get a crash, the crashdump will be written to `ux0:data`. You can open these dumps using VitaShell and then see whether there are any 0x61 or other repetitive values in the registers (assuming you've only written `a`'s into your savedata):

- If the register pc contains the value `0x61616161` or something similar, then congratulations, you've found a new user entry point!
- If `BadVaddr` is `0x61616161` or something similar, then it may also be exploitable (depends on whether it was a load or a store that crashed).
- If it doesn't contain anything special, then continue with fuzzing.

It is very important that in case you find something useful, you should **NOT** show a screenshot of the crashdump that contains any titleid/strings of the game.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close