Dump .pdix

Steps to dump .pdix (PlayStation device identifier) form your PS4/PS4 Pro

Method 1

  • Insert a flash drive into your PC (formatted with fat32) and copy the “pdix-sniffer” file from the PCSX4 folder to the USB flash drive.
  • Insert a flash drive into the front USB port of your PS4/Pro.
  • Make sure that there is no disc in the Blu-ray drive of your PS4/Pro.
  • Close all the apps and games except the web browser.
  • Open this page: PCSX4.com/extract-pdix in your console's web browser. 

configuration-pcsx4

  • Click on the button below to dump PDIX.
  • This takes a few minutes and might fail/crash occasionally depending on exploit reliability. If that happens, please restart the browser or the console.
  • You will receive a “Success” message and your (.pdix) file will be saved on your USB flash drive.
  • Copy that .pdix file into the PCSX4_pdix folder.

Method 2

You can also manually dump .pdix using nodejs API from this source code on PCSX4 repo: PDIX-dumper (GitHub)

  • Make sure your computer and PS4 are on the same network.
  • Setup ps4-payload-sdk
  • Before building, change the IP address (#define BLOBS_ADDR IP(192,168,2,1)) found inside source/blob.c to the IP adress of the pc where the server.py will be running
  • Build the payload for your firmware version with make. Choose one of the following supported firmware versions: 1.76, 4.55, 5.00, 5.05. For example:

    make 5.00

  • Start the server with:

    python server.py

  • Enter your PC IP address within the PlayStation 4 web browser and follow the instructions displayed on screen. The exploit offered by server.py intented to work for firmware 5.00. If you are on a different firmware you should to run an exploit manually and send the dumper payload using netcat/socat:

    socat -u FILE:dumper.bin TCP:"PS4 IP":9020

Credits: CTurt for userland code execution, Fire30 for PoC code execution, AlexAltea for Orbital virtualization engine.