Hacking the Xbox: An Introduction to Reverse Engineering (Google eBook)

Front Cover
No Starch Press, 2003 - Computers - 272 pages
11 Reviews

This hands-on guide to hacking begins with step-by-step tutorials on hardware modifications that teach basic hacking techniques as well as essential reverse engineering skills. The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects of computer security and reverse engineering. Hacking the Xbox includes numerous practical guides, such as where to get hacking gear, soldering techniques, debugging tips and an Xbox hardware reference guide.

Hacking the Xbox also confronts the social and political issues facing today's hacker by looking forward and discussing the impact of today's legal challenges on legitimate reverse engineering activities. The book includes a chapter written by the Electronic Frontier Foundation (EFF) about the rights and responsibilities of hackers, and concludes by discussing the latest trends and vulnerabilities in secure PC platforms.

  

What people are saying - Write a review

User ratings

5 stars
6
4 stars
3
3 stars
1
2 stars
1
1 star
0

Review: Hacking the Xbox: An Introduction to Reverse Engineering

User Review  - Tom Lee - Goodreads

Obviously the specific subject matter is a bit dated, but this still seems like the best way, in 200 pages, to introduce someone to the concepts behind hardware hacking and, not coincidentally, a ... Read full review

Review: Hacking the Xbox: An Introduction to Reverse Engineering

User Review  - Saurabh - Goodreads

Nice book for those interested in electronic hardware. Some parts were very interesting, others not so much, at least for me. Read full review

Selected pages

Contents

The Other 64 MB of SDRAM
155
Xbox VGA
157
Mass Storage Replacement
158
Developing Software for the Xbox
161
Installing XboxLinux
162
Project B
166
OpenXDK
171
Caveat Hacker
173

Tools for Design
20
Deconstructing the Xbox
22
Remove the Top Cover
24
Move the Disk Drives
25
Remove the Disk Drives Optional
28
Thinking Inside the Box
31
Reading a Circuit Board
32
Components
34
Test Points
39
Xbox Architecture
40
Functional Details
42
Northbridges and Southbridges
44
RAM
45
ROM
46
Odds and Ends
47
Pattern Matching
48
Xbox Versus the PC
49
Xbox Versus the Gamecube
50
Installing a Blue LED
53
What Youll Need
54
Removing the Front Panel Circuit Board
58
Installing the Blue LED
59
Reassembling the Front Panel
63
Debugging
65
Building a USB Adapter
67
Strategy
69
Replacing a Broken Power Supply
73
Diagnosing a Broken Power Supply
74
Replacing the Power Supply
76
Strategy
77
Procedure
78
Installing the Replacement Power Supply
84
Operating with the Replacement Power Supply
85
Debugging Tips
86
The Best Xbox Game Security Hacking
89
First Encounters with a Paranoid Design
90
An Encounter with Microsoft
92
Analyzing the ROM Contents
93
A Brief Primer on Security
101
A Brief Primer on Cryptography
104
Classes of Cryptographic Algorithms
105
SHA1 Hash
108
TEA
109
RC4
111
RSA
114
The Rest of the Picture
116
Reverse Engineering Xbox Security
119
Eavesdropping a High Speed Bus
122
Building the Data Logger
128
Determining the Bus Order and Polarity
130
Making Sense of the Captured Data
131
Sneaking in the Back Door
137
Back Doors and Security Holes
138
Visor Jam Table Attacks
139
MIST Premature Unmap Attack1
140
Microsoft Retaliates
141
Reverse Engineering v11 Security
142
The Threat of Back Doors
147
More Hardware Projects
151
LPC Interface on the Xbox
152
Using the LPC Interface
153
A Primer on Intellectual Property
175
Copyright
176
Patent
178
Trade Secrets
179
The Traditional View of Reverse Engineering
180
Copyright Law and the Problem of Intermediate Copying
181
Patent Law
182
New Challenges for Reverse Engineers
183
The Digital Millennium Copyright Act and the Problem of Unauthorized Access
184
Circumvention Technologies
185
reverseengineering for interoperability
186
encryption research
187
Trade secrets and the Economic Espionage Act
189
Civil and Criminal Offenses and Penalties
190
Reverse Engineering as The Freedom to Tinker and Other Legal Issues
191
Onward
193
Hacking Fora
194
Making a Contribution
195
Trusted Computing
197
Taking a Step Back
199
Palladium Versus TCPA
202
Hacking the Trusted PC
204
Looking Forward
205
Concluding Thoughts
206
Where to Get Your Hacking Gear
207
Prepared Equipment Order Forms
209
Soldering Techniques
211
Use Flux
212
Starter Tips
213
Surface Mount Soldering
214
Technique for Simple Components
215
Technique for Complex Components
216
Technique for Removing Components
219
Getting into PCB Layout
223
Schematic Capture
224
Board Layout
226
General Placement and Routing Guidelines
227
Leave Space for Via Fanouts on Surface Mount Devices
228
Know Your Special Traces
229
Circuit Boards Make Fine Heatsinks
231
Hints on Using an AutoRouter
232
Board Fabrication Companies
233
Advanced Circuits
234
Getting Started with FPGAs
237
Designing for an FPGA
239
Project Ideas
243
Where to Buy
244
Debugging Hints and Tips
247
Observe Symptoms
248
Common Bugs
249
Recovering from a Lifted Trace or Pad
252
Xbox Hardware Reference
257
Video Connector Pinout
258
USB Connector Pinout
260
Ethernet Connector Pinout
261
ATA Connector Pinout
262
DVDROM Power Connector
263
LPC Connector
264
Fan Connector
265
Index
267
Copyright

Common terms and phrases

Popular passages

Page 9 - ... solely for the purpose of enabling interoperability of an independently created computer program with other programs, and to the extent that doing so does not constitute infringement under this title or violate applicable law other than this section. (4) For purposes of this subsection, the term 'interoperability...
Page 7 - ... (B) whether the person is engaged in a legitimate course of study, is employed, or is appropriately trained or experienced, in the field of encryption technology...

References to this book

About the author (2003)

Andrew "bunnie" Huang lives in Kalamazoo, MI.

Bibliographic information