QUOTE(Lamer123 @ Apr 21 2006, 06:03 AM)
Ok after a couple re-reads I think I understand .
They are claiming that they They have found two different potential security exploits .
1. that they can write unsighned data to the xbox dash data on the 128 on board nand , by using a local area network .
2. and they have found a security hole in the boot loader chip .
Please correct me if i am wrong , seriously . I want to know what this is all about .
I'm not sure about what you've posted. The take home message I get is from this section:
QUOTE
Using a fast FPGA card, it is possible to insert a parser/driver between the motherboard and the optical reader... we let the reader conclude by himself (sed -e 's/DVDFAKE/DVDXBOX/g Input > Output ;-)). What about the SATA HD?... wait and see. Maybe another time when few things would have been detailed.
is that using a Field Programmable Gate Array on a PCB (card) they will feed the correct info to the xbox regardless of what the DVD firmware is doing.
So, rather than flashing your DVD's fimware in order to produce expected values to authenticate a disk, this chip will be programmed to do that. Sounds like a "modchip" version of the firmware hack. Probably would contain a table in flash that could be altered to keep up with any changes. Also the ability is there to support all drives as yo udon't care what particular firmware a device has, long as you can recognise and rewrite the signals to what is expected.
The whole sed reference is for rewriting the data on the fly I am guessing, and is what makes me think the above