now I know why I can't find it... can anyone update me the situation? I just watched those threads the last weekend and suddendly everything is gone x, xguys the other thread got locked because of shitposting. Do you want to happen the same here?
@Hykem@hykem,you know,there're different people in the world.Pay no attention to these impatience guys.I support you.Your patience,efforts,industry and perspiration are precious I cherish.You have to face these rumors,you have to be prepared since you determined to work on this subject,don't you?Always believe many people will appreciate your efforts.I SUPPORT YOU!!!
IT'S NOT FUCKING FINISHED
Where did you read that?, If the exploit is actually finished, it should be online right nowMaybe you should do some research. It is finished.
no it's notMaybe you should do some research. It is finished.
just had a word with hykem a couple hours ago. he's still working on 5.3.2 and didn't have much time last week, but he said he'll try to put it working this week![]()
no it's not
"I'll release the exploit right away" = It's finished.With that said, if this turns out to be nothing, I'll release the exploit right away.
but not for 5.3.2"I'll release the exploit right away" = It's finished.
Why is he even bothering with 5.3.2? Especially when he said that 5.5.1 is safe to update to? Something's extremely fishy about that.
Hykem, why do you think you're being called a fake?
- The exploit being used works from 2.0.0 up to 5.5.0, but it obviously needs to be ported for each firmware;
So obfuscation is completed on 5.5.0/5.5.1 5.3.2 and 3.0.1?
no, obfuscation has nothing to do with the exploit itself. exploit is complete on 3.0.1 and 5.5.0/5.5.1, but they both are missing obfuscation
and because lots of us are still in 5.3.2 and we have more options by staying in that firmware
yeah but we would like to have IOSU exploit too for nice things like USB access (yeah, we're greedy afBut you guys already have both a userland + kernel exploit.
That's right, is finished, but if you read the full Hykem message you will see he is working in a MCP module which will make the exploit work a lot better that it was originally said to work, I mean this:"I'll release the exploit right away" = It's finished.
Why is he even bothering with 5.3.2? Especially when he said that 5.5.1 is safe to update to? Something's extremely fishy about that.
Hykem, why do you think you're being called a fake?
So, I've got good news and bad news.
The bad news is that I'm going to postpone the release again. I said this week would be a more realistic release date, but I never confirmed it would happen then. Still, it's not a huge delay and it's definitely not to wait for a new firmware update.
Like I stated before, I have the entire month of January free just to work on this and the exploit will be released and maintained before February (yes, I'm sure of that).
Now the good news, which should explain the additional delay. I need some time to pursue something I found in the MCP module. If I'm correct about this, we should be able to get a boot-time exploit. The reason for that is that the MCP module is responsible for launching "master" titles (like the PPC kernel, for example) and I found a bug that, if it turns out to be exploitable, should allow to hijack execution while MCP is still preparing to launch stuff. This means, early IOSU access and a direct boot into an exploitable environment. Not to mention that MCP is the IOSU user module with most privileges (next to BSP that is) and having access to it alone is more than enough to own the IOSU kernel at any given time.
I believe it's important to look into this because if it works, no one will have to worry about possibly bricking consoles by installing custom titles (homebrew channel, for example) and then attempting to launch them before triggering the exploit again after a fresh boot.
With that said, if this turns out to be nothing, I'll release the exploit right away.
That's right, is finished, but if you read the full Hykem message you will see he is working in a MCP module which will make the exploit work a lot better that it was originally said to work, I mean this:
So, the exploit may be finished but it could get a lot better if he manages to exploit the MCP module too, then we will get a better IOSU exploit since it has early IOSU access (at boot time, it boots master titles ,etc... )
Even this can save our console from brick by installing titles the wrong way.
So, at least for me Hykem can take all the entire year to develop the exploit.
Oh I didn't know that, thanks xD !, I was reading the Definitive hacking thread and there isn't any news, that's why I thought that he was still working in MCP ...He already said that he has quit working on the MCP module until the exploit is released. For now he's focusing on obfuscation and porting.
Why is he even bothering with 5.3.2? Especially when he said that 5.5.1 is safe to update to? Something's extremely fishy about that.
