HellasVagabond
New Member
- Joined
- Jan 19, 2007
- Messages
- 3,376 (0.52/day)
- Location
- Athens , GREECE
System Name | SECONDARY RIG / PRIMARY RIG / THIRD RIG |
---|---|
Processor | i920@3.6GHz / i920@4GHz / AMD Phenom II 955 |
Motherboard | Gigabyte EX58-UD4P / Gigabyte EX58-UD7 / ASRock 890GX3 |
Cooling | CoolIT Domino ALC / Thermalright Silver Arrow / Thermalright VenomousX |
Memory | 12GB DDR3 @ 1800MHZ / 6GB DDR3 @ 2250MHZ / 4GB DDR3 @ 1600MHZ |
Video Card(s) | XFX ATI RADEON 5970 / GAINWARD NVIDIA GTX 580 / 2xGEFORCE GTX295 |
Storage | 1550GB / 6TB SAS - SSD / 160GB SSD |
Display(s) | NEC 26WUXi2 / NEC 3090WQXi / SONY 55A2000 (1080P 55inch) |
Case | COOLER MASTER HAF 932 / COOLER MASTER ATCS 840 / ANTEC DARKFLEET DF85 |
Audio Device(s) | Soundblaster X-Fi Xtreme Music / SoundBlaster X-Fi Fatal1ty Pro / Realtek Onboard |
Power Supply | CWT 1200W / Enermax Revolution 85+ 1250W / Ikonik Vulcan 1200W |
Software | Windows 7 x64 / Windows 7 x64 / Windows 7 x64 |
Xbox 360 Hacked
A Hacker under the nickname SeventhSon has discovered a method to alter both the DVD key and game region code on Microsoft's Xbox 360, at least for the Hypervisor exploitable 4532 and 4548 kernels. A great part of this hack also involves desoldering your Xbox flash chip something that only the technologically handy will try.
View at TechPowerUp Main Site
A Hacker under the nickname SeventhSon has discovered a method to alter both the DVD key and game region code on Microsoft's Xbox 360, at least for the Hypervisor exploitable 4532 and 4548 kernels. A great part of this hack also involves desoldering your Xbox flash chip something that only the technologically handy will try.
I successfully changed the DVD key and region code of a 360. So it's all confirmed.
As for landmarks and interweb fame. All I did towards this was to reverse the plaintext KV signature to figure out how to modify and resign the KV contents. And even this work was built on the efforts of other hackers. For example, I didn't locate the region code in the KV and a lot of the SHA1 and RC4 encryption code was reversed and documented by others way before I started looking at it. *If* the region code tests are successful, then the following people contributed *much more* to this achievement than me.
Takires, TheSpecialist, Robinsod, tmbinc.
The following assumes you have the correct 1BL key and CPU key set in the flashtool.
1. Dump the NAND from the US 360 (528-bytes-per-page)
2. Open in the latest flashtool (v0.8) and click [extract]
3. Edit extracted KV.bin and change 16-bits at offset 0xB8 from 0x00FF to 0x02FE
4. Open in flashtool and click [patch], check the "patch keyvault" box and select the KV.bin modified in step 3
5. Click [OK] and choose output file
6. Flash output image back to the NAND of the US 360
7. Try an EU game or two.
View at TechPowerUp Main Site
Last edited by a moderator: