### run the exploit
```shell
pppwn --interface en0 --fw 1100 --stage1 "stage1.bin" --stage2 "stage2.bin" --timeout 10 --auto-retry
```
- `-i` `--interface`: the network interface which connected to ps4
- `--fw`: the firmware version of the target ps4 (default: `1100`)
- `-s1` `--stage1`: the path to the stage1 payload (default: `stage1/stage1.bin`)
- `-s2` `--stage2`: the path to the stage2 payload (default: `stage2/stage2.bin`)
- `-t` `--timeout`: the timeout in seconds for ps4 response, 0 means always wait (default: `0`)
- `-wap` `--wait-after-pin`: the waiting time in seconds after first round CPU pinning (default: `1`)
- `-gd` `--groom-delay`: wait for 1ms every `groom-delay` rounds during Heap grooming (default: `4`)
- `-bs` `--buffer-size`: PCAP buffer size in bytes, less than 100 indicates default value (usually 2MB) (default: `0`)
- `-sn` `--spray-num`: SPRAY_NUM increase can help reliability. Enter in hex OR decimal. (Default: 0x1000 or 4096)
- `-pn` `--pin-num`: PIN_NUM is the time to wait on a core before proceeding with the exploit. Enter in hex OR decimal. (Default: 0x1000 or 4096)
- `-cn` `--corrupt-num` : CORRUPT_NUM is the amount of overflow packets sent to the PS4. Enter in hex OR decimal. (Default: 0x1 or 1)
- `--ipv6`: Use your own ipv6. Doesn't check for correct formatting, use with caution. Can be useful for testing exploit parts or useful on difficult consoles.
Перевод автоматический от меня: - `--ipv6`: Используйте свой собственный ipv6. Не проверяет правильность форматирования, используйте с осторожностью. Может быть полезен для тестирования частей эксплойта или для сложных консолей
- `-a` `--auto-retry`: automatically retry when fails or timeout
- `-nw` `--no-wait-padi`: don't wait one more [PADI](
https://en.wikipedia.org/wiki/Point-...itiation_(PADI)) before starting the exploit
- `-rs` `--real-sleep`: use CPU for more precise sleep time (Only used when execution speed is too slow)
- `--web`: use the web interface
- `--url`: the url of the web interface (default: `0.0.0.0:7796`)