Hacking the Xbox: An Introduction to Reverse Engineering
9 Ungluers have Faved this Work
Login to Fave
"Hacking the Xbox" is a fascinating book about exactly what it says. If you have no interest in gory details of JTAG probe points, cryptography, so called "trusted computing" and "digital rights management" and the technical issues at stake in trying to implement and/or attack them... then this book will bore you to tears. If you *do* have such interests, then you are in for a treat. The book opens with 5 chapters of fairly broad physical overview, walking through the hardware systems in Xbox consoles and some (relatively) simple projects to get your hands dirty with a soldering iron. Then on to some meaty chapters introducing you to the security model of the platform, and the attacks that the author and others developed to ultimately succeed at running arbitrary code on these systems. These chapters provide a fascinating blow-by-blow account of the process of developing the attacks. Then, we wrap up with some practical material regarding how to use these attacks to run, for instance, Xbox-Linux on a hacked machine, and some bigger picture information on the legal environment facing US hackers interested in these matters.
Why read this book? Have your say.
You must be logged in to comment.
Rights InformationAre you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.
This work has been downloaded 326 times via unglue.it ebook links.
- 326 - pdf (CC BY-NC-SA) at Internet Archive.
- Computer hackers
- Computer security
- Reverse engineering
- Security research
- Trusted computing
Copy/paste this into your site: