English Русский


In case you're dumb: this ONLY works on FW 9.00. If you are on 6.72 or lower, go here. If you are on 7.00-7.02, go here. If you are on 7.50-7.55, go here. If you are on a higher firmware (e.g. 9.03), your console CAN'T BE HACKED yet.

  1. Flash this image onto a USB drive. You can use the "Etcher" program (download here) to perform the flashing. Note: this will erase your USB drive, and you will NOT be able to use it for anything else. It will become a jailbreaking dongle ONLY.
  2. Click on the link that says JB+MIRA or JB+HEN, depending on your personal habits. In about a minute you'll be prompted to insert the USB drive you prepared. Insert the USB drive, wait for the notification about the invalid format to pop up, then eject the drive and click OK. Important: never leave the drive inserted during a reboot!
  3. You will get a message saying "There is not enough free system memory". This is normal, just click OK.
  4. After 20 more seconds you will get an alert saying "You're all set!", followed by "There is not enough free system memory". This means that everything has gone well. Note: if using Mira, the screen will go dark for a dozen of seconds.
    If something went wrong during the process, you may get an alert with an error. In this case you must reboot your PS4, preferrably without closing the dialog box.
    If the system hangs for more than a minute (may require more time on slow Internet connections), reboot your PS4 and try again.
    If the system crashes (looks like instant powerdown), press the power button on the PS4 (NOT on the gamepad) until it turns on again, then retry.
  5. If you get a "There is not enough free system memory" message without any pop-ups, then it means that the webkit exploit has failed. Click OK and retry. This error is not going to harm your console.
  6. For advanced users: To load your own payloads using NetCat, run JB+NETCAT and send the payload to TCP port 9021 (9020 for the legacy version).

This exploit does crash and hang. Sometimes you even have to retry 10 times to get the jailbreak.

Credits: @ChendoChap for kernel exploit (both the vulnerability and the implementation), Google Project Zero for WebKit vulnerability.