Free60-Wiki

Attack

From Free60

This page was created when knowlage was low, everything on here is impossible, due to the 360s hypervisor The only exploit there is and ever will be is the king kong/jtag(smc)/whatever hypervisor bug found in kernel 4532 -slasherking823

Actually, upon further examination, this page was created by someone with no knowlage even when public knowlage existed

Bade Ideas are as follows:

Please reply and comment each attack and tell us if such attacks are possible or not

Please do not erase wrong things but reply instead

Some basic knowledge

Ideas

No void warranty

Software

Hardware

Torx and Solder

Failed Vectors

To save people revisiting old ground please list any attempts that have failed here

Discussion

Page design

this is a stub or whatever you call this kind of page…

it’s as a “brouillon(french)”

this page has not been reviewed by skilled persons…(mabe they haven’t got the time) this page could be reviewed by someone that is not a developer(precious time) but is a press expert and know what is possible and what isn’t

so put evrything on the main page and discuss it on the main page it’s ment for this

and if something cleen and verified can be produced we will make another “stable” page that developers should read

IDEAS

Xbox 360’s OS has its root in the OS of the original Xbox (which is derivate from Windows 2000). I think that some bug and exploit in Xbox 1 (or even 2000) still work on the 360, we have to try every bug/fuzzing/hole knowed to find exploits.

Ideas :

- file format fuzzing (there are some tools in sourceforge), example : image format like wmf (recent exploit in Win 2000 and XP plateform due to implementation of the fct escape() and not a BO!!!!!)

XMA is a very good way to find some holes, and Sounds aren’t signed (Demo DVD) Someone has Doc about XMAÂ ? maybe in XACTÂ ?

- by network UPnP (use XML), it’s seems that the norm think about security like not permit to send XML break char, or limit ACL hack, but if there are an XML implementation (lib XML) there are chance to find an exploit.

We all know Microsoft’s security in their implementation of norms (like IP stack or other).

- by DMA, using USB (security hole in Win 2000\&XP ohcpi) other way : IDE (sata), we can try to access to DMA with a PC connected to the Xbox…by SATA ;-) the idea is to use the PC like an IDE device for the Xbox 360. i’m reading the DMA-API and IDE doc for linux (if you have linux, interessting stuffs are in /include/Documentation/DMA-API.txt & DMA-mapping.txt and in /include/Drivers/ide/ )

- by threads, if we can use the GPU to access to RAM and acces to the same area as the CPU we can do some buggy things (in fact thread is not necessary)

ressources :

- metasploit, a huge DB for exloits and shellcodes https://metasploit.com/

- milw0rm, exploits milw0rm.com

- fuzzing file and network http://rtos.trinux.org/secwiki/FuzzingTools

XEX executables

What security problems are known about the XEX files. They can be burned to DVD/CD and used to install the backwards compatability emulator, so attacking them would be a good idea. Since the OS for the 360 is based on Windows, is the .xex file in any way related to .exe? .xex files renamed to end in .exe do not do anything in Windows. I would like further documentation on what happens when the emulation software is executed via CD/DVD. –Monsuco 19:29, 9 Mar 2006 (CET)

The XBOX360 CPU is based on the PowerPC architecture, not on Intel like PC CPUs. For that simple reason, an XBOX360 executable will never run under a PC version of Windows.–Silence 10:59, 10 Mar 2006 (CET)

First guy is absolutly retarded >_> -Thilo

XNA

- The XNA libraries are .Net wrappers around various DirectX libraries (XACT, XInput, Direct3D, etc), and runs on the .NET Compact Framework. Both frameworks are fairly large and complex and it could be a possible candy store for exploits.

After all that

No No No and btw No

Views
Personal tools

Category:Support