13.03.2013 Views

Hacking the Xbox

Hacking the Xbox

Hacking the Xbox

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CHAPTER 6<br />

The Best <strong>Xbox</strong><br />

Game: Security<br />

<strong>Hacking</strong><br />

The next step beyond modifying and tweaking <strong>the</strong> <strong>Xbox</strong> hardware is taking<br />

control of <strong>the</strong> <strong>Xbox</strong> hardware. Unfortunately, gaining control of <strong>the</strong><br />

hardware is not as easy as one might think. The designers of <strong>the</strong> <strong>Xbox</strong> put a<br />

great deal of thought into securing <strong>the</strong> hardware against sophisticated<br />

software attacks as well as most simple hardware attacks. The <strong>Xbox</strong>’s security<br />

mechanisms are an artifact of its digital rights management architecture.<br />

Note<br />

In principle, applying hardware to “fair-use” purposes,<br />

such as running your own homebrew programs, should<br />

not be illegal. However, <strong>the</strong> relationship between fair use,<br />

secured hardware, and <strong>the</strong> relatively new copyright control<br />

circumvention laws is still unclear. Chapter 12, “Caveat<br />

Hacker,” discusses <strong>the</strong> legal issues of hacking in more<br />

detail.<br />

There are many ways around <strong>the</strong> <strong>Xbox</strong>’s security measures. In this chapter<br />

and in Chapter 8, “Reverse Engineering <strong>Xbox</strong> Security,” I tell <strong>the</strong> story<br />

of my adventures mapping out <strong>the</strong> <strong>Xbox</strong> security system. I write not<br />

only about <strong>the</strong> successes, but also about <strong>the</strong> failures I encountered, so that<br />

you can learn from my experiences. Chapter 9, “Sneaking in <strong>the</strong><br />

Backdoor,” explains some approaches taken by o<strong>the</strong>rs to get around <strong>the</strong><br />

<strong>Xbox</strong>’s security measures. Chapter 7, “A Brief Primer on Security,”<br />

provides <strong>the</strong> background necessary to appreciate Chapters 8 and 9.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!