On Mon, Nov 28, 2005 at 09:00:05PM -0800, Dan wrote:
> Hmm outsmarted again. Apparently they do some kind of 'secure
> hashing'. No executable stacks. Hopefully I'll be a bit more informed
> before I post again.
non-executable stacks dont prevent exploitation, it just raises the bar
a litte bit -
On Mon, 28 Nov 2005 20:13:28 -0800
Dan <[EMAIL PROTECTED]> wrote:
> ... Hopefully it will be possible to plug a 360's HD
> in a (SATA-capable) computer, put specially crafted files on, and get
> the 360 to use it. E.g. a movie clip that exploits a yet-to-be-found
> buffer overflow/other vulnerabili
Hi All,
In the freely downloadable default.xex, I noticed a couple things.
there is a reference to a xam.xex that everyone seems to have
ignored/overlooked so far (0x1b80), adjacent to xboxkrnl.exe .
The file seems to follow some pattern until 0x2000, which is then either
compressed, encrypted o