Hi All, In the freely downloadable default.xex, I noticed a couple things. there is a reference to a xam.xex that everyone seems to have ignored/overlooked so far (0x1b80), adjacent to xboxkrnl.exe .
The file seems to follow some pattern until 0x2000, which is then either compressed, encrypted or (most likely) both. Probably nothing, but the ASCII characters 'XEX' (not null terminated like other strings) appears in the middle of default.xex at 0x146b69 . Considering the lack of any repitition or patterns from 0x2000 to 0x25b800, it's probably just a statistical artifact. There is zeroed padding from 0x25b800 to 0x25c000, indicating that .xex files probably have sizes that are multiples of 4096 bytes (some encryption block size?). Also, any ideas on the security mechanism of the SATA hard drives? There may be none because the HD are optional. Anyone know about the filesystem on them? Hopefully it will be possible to plug a 360's HD in a (SATA-capable) computer, put specially crafted files on, and get the 360 to use it. E.g. a movie clip that exploits a yet-to-be-found buffer overflow/other vulnerability. Similar to the so-called font hack (Bert & Ernie or something like that.) Dan McDonald ------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Do you grep through log files for problems? Stop! Download the new AJAX search engine that makes searching your log files as easy as surfing the web. DOWNLOAD SPLUNK! http://ads.osdn.com/?ad_id=7637&alloc_id=16865&op=click _______________________________________________ free60-devel mailing list free60-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/free60-devel