| QUOTE (Spree @ Nov 19 2002, 02:00 AM) |
| This is where it sucks to not have a copy of our old eeproms cause if we did we could probably just copy that back to the eeprom and be ok. That is my theory anyway. |
| QUOTE (opjose @ Nov 19 2002, 06:27 AM) |
| Zander: I can verify that the MAC address is directly tied to the serial number of the Xbox. I've been able to generate a valid eeprom (but not valid as far as XBLive is concerned) by decrementing the low order byte of one number in the serial and the incrementing a byte in an adjacent low order byte of another number. This old CRC trick gets the Xbox to accept the checksum and headers as being correct. However the MAC then is seen as screwed up. By performing the same trick on the MAC address you can get a working eeprom. However there is something more to it than this, somehow the header values (I believe) are tied to the Serial/Mac keys, although it could well be that the online serialization is at fault as I have not had a chance to try this. So far EVERYTHING you have said mimics what I have seen in packet sniffing attempts, though you are now a bit further than me. Yes, there -ARE- holes all over the place eh? I'd imagine a linux patch sending the same packets obtained during an initial negociation of an unmodded (or better yet modded system with the chip switched off but the drive locked) would do the trick as the eeprom values which are sent do not change subsequently. If we could intercept the exact sequence which gets the Xbox to reveal if it is modded or not, then a filter of some sort may be possible that would replace the "I'm modded" packets with ones from a virgin Xbox (e.g. from the same Xbox before modding), and BANG... Kerberos is none the wiser. Great stuff BTW! |
| QUOTE |
By performing the same trick on the MAC address you can get a working eeprom. However there is something more to it than this, somehow the header values (I believe) are tied to the Serial/Mac keys, although it could well be that the online serialization is at fault as I have not had a chance to try this. |
| QUOTE (Zander @ Nov 19 2002, 12:31 PM) | ||
opjose,
After talking to a couple of guys last night, I might be at a brick wall. The online key burned into the eeprom during the xbox's creation IS stored in the back-end database on the XBL network. I can tell this because as apart of the kerberos spec as defined in RFC1510, the key is a shared secret key, the key is never put over the wire, it's already known by both parties. AS.XBOXLIVE.COM knows this key by querying the back-end (which I'm sure is Active Directory) and it get's the key needed for authentication, this key matches the eeprom. Now here is where it get's sticky, and I get out of my field. What if the online key is semi-random upon creation? Among a few other things in the eeprom, you have the following (as near as I can tell). time audio setting video setting serial # MAC hdd key online key now IF that online IS random, they we may have a problem. There would be no way to determine the online key based on the serial number or MAC of the xbox unit that someone is trying to "clone" to get it online via Live, you would need to open the box and get the contents of the eeprom. IF the online key is a hash somehow of the MAC or maybe HDD key, then we could have something to work off of. But I'm afraid if the online is random, then we are screwed. Thay means getting serials off of unit means nothing (this would explain why the serial is transmitted in the cleartext during the conversation, it means nothing, it's just used by the back-end to lookup a key to be used for encryption. Thoughts? Z |
| QUOTE (mod7 @ Nov 19 2002, 03:29 PM) |
| Wow what do you know....man in the middle attack like I freaking mentioned what was it 5 days ago. If any of you use linux/unix out there here is a start. Try ettercap from http://ettercap.sourceforge.net/ by Alor and Naga....I am a beta tester for this and can help test I just cannot do too much c programming yet....so if anyone would like to try some of this stuff I am game....I have the sniffing/man in the middle knowledge if you have the c programming knowledge. btw already have packet sniffs etc performed on a sidewinder box on the inside nick and outside etc using tcpdump ettercap and other bits of info.....also this brings up a great program as well that is windows based it is called hailstorm....hmmm lets see url is http://www.cenzic.com/ they have an eval there for it....what it can do is capture all packets sent from a specific node and save it and regenerate it.....what needs to be done is a filter for ettercap written in c to replay the good packets from a non modded chip....i.e. your box with mod disabled then renable the mod and do a man in the middle attack and shoot off the good packets....not actually that hard cause all we have to do is send packets....I am however worried about time stamping should'nt be too much of an issue etc....pm me. |
| QUOTE (Spree @ Nov 19 2002, 08:43 AM) |
| Dude man no offense but we are trying to keep the thread technical. We don't need crap like that blocking the view. |