xboxscene.org forums

Author Topic: Question About The Flash Dump Tool & Xbox 360 Boot Process  (Read 42 times)

mod_alias

  • Archived User
  • Newbie
  • *
  • Posts: 1
Question About The Flash Dump Tool & Xbox 360 Boot Process
« on: June 06, 2007, 03:43:00 PM »

I was reading about the Flash Dump Tool v0.1 and v0.2 announced here and here and I was wondering how to extract the necessary key to perform the decryption.

From the news page about the Flash Dump Tool v0.1:
QUOTE
The tool consists of the exe and CxKey.txt. CxKey.txt is delivered with 32 '0's and they should be replaced with the key obtained from the 1BL. After all the fuss about AACS keys recently it seems risky to put the key in the exe.


Doesn't this quote imply that the key is not unique to an Xbox 360 but will work on all of them? I thought Xbox 360's have their keys hardwired into the processor, including a unique per box key for decrypting the flash. If this key is hardwired into the processor, it never has to travel over a bus and can't be sniffed.

I think part of the reason I'm not understanding this is because I don't have the expertise/time/resources to monitor the bus for activity, but I still want to see if I can hack the hypervisor and kernel. I was wondering if someone with more advanced hardware knowledge could explain the Xbox 360 boot process to me in detail.

This post has been edited by mod_alias: Jun 6 2007, 10:44 PM
Logged

No_Name

  • Archived User
  • Hero Member
  • *
  • Posts: 562
Question About The Flash Dump Tool & Xbox 360 Boot Process
« Reply #1 on: June 06, 2007, 03:16:00 PM »

Its been detailed over on www.xboxhacker.net
Logged