Steps to dump .pdix (PlayStation device identifier) form your PS4/PS4 Pro
- Insert a flash drive into your PC (formatted with fat32) and copy the “pdix-sniffer” file from the PCSX4 folder to the USB flash drive.
- Insert a flash drive into the front USB port of your PS4/Pro.
- Make sure that there is no disc in the Blu-ray drive of your PS4/Pro.
- Close all the apps and games except the web browser.
- Open this page: PCSX4.com/extract-pdix in your console's web browser.
- Click on the button below to dump PDIX.
- This takes a few minutes and might fail/crash occasionally depending on exploit reliability. If that happens, please restart the browser or the console.
- You will receive a “Success” message and your (.pdix) file will be saved on your USB flash drive.
- Copy that .pdix file into the PCSX4_pdix folder.
You can also manually dump .pdix using nodejs API from this source code on PCSX4 repo: PDIX-dumper (GitHub)
- Make sure your computer and PS4 are on the same network.
- Setup ps4-payload-sdk
- Before building, change the IP address
(#define BLOBS_ADDR IP(192,168,2,1))found inside source/blob.cto the IP adress of the pc where the server.pywill be running
- Build the payload for your firmware version with make. Choose one of the following supported firmware versions: 1.76, 4.55, 5.00, 5.05. For example:
- Start the server with:
- Enter your PC IP address within the PlayStation 4 web browser and follow the instructions displayed on screen. The exploit offered by server.py intented to work for firmware 5.00. If you are on a different firmware you should to run an exploit manually and send the dumper payload using netcat/socat:
socat -u FILE:dumper.bin TCP:"PS4 IP":9020