Hi All,

In the freely downloadable default.xex, I noticed a couple things.
there is a reference to a xam.xex that everyone seems to have
ignored/overlooked so far (0x1b80), adjacent to xboxkrnl.exe . 

The file seems to follow some pattern until 0x2000, which is then either
compressed, encrypted or (most likely) both.

Probably nothing, but the ASCII characters 'XEX' (not null
terminated like other strings) appears in the middle of default.xex at
0x146b69 . Considering the lack of any repitition or patterns from
0x2000 to 0x25b800, it's probably just a statistical artifact.

There is zeroed padding from 0x25b800 to 0x25c000, indicating that .xex
files probably have sizes that are multiples of 4096 bytes (some
encryption block size?).

Also, any ideas on the security mechanism of the SATA hard drives?
There may be none because the HD are optional. Anyone know about the
filesystem on them? Hopefully it will be possible to plug a 360's HD in
a (SATA-capable) computer, put specially crafted files on, and get the
360 to use it. E.g. a movie clip that exploits a yet-to-be-found buffer
overflow/other vulnerability. Similar to the so-called font hack (Bert
& Ernie or something like that.)


Dan McDonald


-------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc. Do you grep through log files
for problems?  Stop!  Download the new AJAX search engine that makes
searching your log files as easy as surfing the  web.  DOWNLOAD SPLUNK!
http://ads.osdn.com/?ad_id=7637&alloc_id=16865&op=click
_______________________________________________
free60-devel mailing list
free60-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/free60-devel

Reply via email to