- Following up on his previous
update, today PlayStation 3 hacker SKFU
has now shared a few more details on PSNSSS codenames below for PlayStation 4 (PS4) / Orbis stores.
To quote: PSNSSS - Codenames
PSNSSS development continues. Since not all products can be found via a simple search, because some have a flag which forbid to be found this way; I implemented a browsing function.
While browsing the now 522 different stores I noticed a few codenames multiple times:
It is still unknown what they mean, but based on the information gathered until now it seems those are codenames for upcoming SONY platforms.
I hope to be able to improve the app further to get more details on this matter.
: It contains Information about the game/dlc or whatever the contentID belongs to. You can also find "apollo" links which are used for the store png's etc..blabla...
Finally, from JonahUK
: "SWORDFISH" is used in mM, possibly to check for content:
[Register or Login to view code]Update
: PSNSSS - Patched
Dear SONY employee,
Congratulations for finding the ridiculous mistake and fixing it
It took you guys over 1 week and probably external consultation to solve this problem. The question is why did it take so long and how was it even possible to miss this important step of security which any skiddy can setup easily?
I don't blame you since I know how large your network is, but if it takes one guy hours and one damn huge company days to find such a vulnerability, something is wrong don't cha think so?
Sadly I have to tell you that it was part of the plan, simply to check your resources and capabilities. Sorry, had to know how much time I'd possibly have to grab the data from the really interesting sources
We both know that this part of the network won't be used for long anymore. Therefor I will switch over to the new target now and leave you a well-intentioned advice:
Do not outsource all your data storages externally, most of them are even weaker than your own spaces.