-
Try the 360 Hacking forum.... may be more of use to you (and will answer most of ur questions)
-
thers a few weaknesses in the 360. not all in emulation. for one it might be possable to crack the downloadable iso. emulation hell might even be able to be crashed the same way a xbox is. mce might have some weaknesses to sence it uses udp its possable to packetflood it with a pay load to crash the system and run a expolite. of course thats just the softwhere side of things. to mutch is not knowen still but modchips will probly be first then some kind of softmod. even if the softwhere is prety mutch hackproof the hardwhere never is.
-
moving.
-
has anyone tried running the 007 / mech hack on the 360 ? .. u can copy the saves from a usb drive no ? .. i don't have a 360 yet ..
i guess thats assuming either of those games are supported as of now ..
-
Can't be done. Saves are non-transferable, and the 3 exploitable games have no emulator updates. Also, there is plenty of buffer overflow protection on the 360.
-
the emulator has a very specific compatibility list, somehow i doubt MS was kind enough to include our homebrew apps on that list, so they wouldnt run even if we could sign them
we cant write our own emualtor becuase the emualtor is protected by the 360 security, and if we could crack that would wouldnt need to hack the emualtor, lol
the downloadable emulator updates are just a single xex, not an iso (at least the one i got from xbox.com was) meaning theres nothing we can do it, it would invalidate the signature
-
If you design your own software for security,would it work as a homebrew app or as a unknown file? But why are the 360's crashing? Did MS design a faulty system or did they release it to early for consumers to buy? The power adapters itself are huge and the systems are water-cooled,so what's going on?
-
I think that it is so early in the process - very few people even have consoles yet -- that we don't even know what we don't know. It will be a while before we even have enough information to allow for valid speculation, let alone any sort of real path that might lead to a hack.
And as to sytems having problems, try shipping half a million complex machines in a day and see if you don't get some problems. Most hardware has a failure rate in the lw single digit percentages. I would be very surprised if the real failure rate on 360's was any greater than 1-2%, but even at that very low level you would still see several thousand people with problems, and with all the media and the fact that people without problems tend not to scream about it on forums, it shows up as more significant lump than is warranted.
-
QUOTE(360fan13 @ Dec 2 2005, 11:01 AM)

The power adapters itself are huge and the systems are water-cooled,so what's going on?
Water-cooled? You've been reading wrong buddy, the 360 is cooled with huge heatsinks and 2 fans...
-
hes talking about dual processor G5's
-
In my opinon its average due to the fact theres so many possible ways we could exploit it.
-
QUOTE(azninvasion @ Dec 1 2005, 09:11 AM)

So what is needed is someone to crack the impossible private key from the original xbox
The key can't be 'hacked' by some kind of reverse engineering, only thing you can do is brute force it. Good luck with that
I'll buy you a beer if you find it before 2010
And why try to crack the key from the original xbox ? I'd rather have the one from the xbox 360 
QUOTE
I don't believe anyone has yet cracked the private key, but if we were able to, I think it would be a very good possibility that we could get many of our homebrew apps from xbox-old to run on xbox-new.
"Very good possibility" ? If we have the private key from the 360, then we can run ANY code on the xbox 360, from any medium ! Nobody would need to hack his/her xbox anymore, you could just dl the iso from internet and play it on your 'unhacked' xbox, what more could you possibly wish for ? 
But really, forget about hacking the private key, it's just not feasible ...
-
QUOTE
"Very good possibility" ? If we have the private key from the 360, then we can run ANY code on the xbox 360, from any medium ! Nobody would need to hack his/her xbox anymore, you could just dl the iso from internet and play it on your 'unhacked' xbox, what more could you possibly wish for ?
But really, forget about hacking the private key, it's just not feasible ...
unfortunately doing this would do jack crap for 360, if the private key (for either xbox or 360) were cracked MS would issue a kernel/emulator update with built-in media checks so we wouldnt be able to run backups anymore
of course for people not connected to Live this wouldnt bother them, but the 360 would only have to connect to Live once to screw you
plus, whats an xbox without Live? lol
-
What people dont get, people at MS look on these kind of forums everyday to see if someone has modded the 360. So they can find out quick, and try to create a patch.
-
QUOTE(TheSpecialist @ Dec 2 2005, 11:20 PM)

I don't see the problem, just alter the mediatype flag on the ISO to 'boot from any (non-secure) medium' and resign it with the Private key

thats fine for xex-based media checks, im saying MS would update and use KERNEL-based checks, and we'd be left right back where we are now, trying to hack the kernel
-
QUOTE(TheSpecialist @ Dec 3 2005, 12:30 AM)

What kind of checks are you exactly referring to ? I mean, if the mediatype is set to 'non secure medium' and the files are signed with the correct key, they'll boot on any 360, independant of kernel version.
the media checks used on xbox and 360 are inside the xexs (xbes) the executables look to the media type and if they dont match they dont launch, these are the ones that can be patched and easily re-signed (if we had the key)
the 360 features an updatable kernel, MS could very easily put a media check into the kernel (more like the media cehcks in a ps2 than an xbox), to check the media type for all xexs, an dont load them from recordable discs, this check could easily function regardless of what the media type declared in the xex itself is
MS would no longer be able distribute the emulator updates in a burnable format, but given the hypothetical that the private key has been cracked, thats a very small price to pay for re-securing the 360
-
QUOTE
that means that this kernel code remains in a writable place of the XBOX, which means that we could easily patch it
this assumes that along with the private key youve also cracked Live security (to send the kernel update) and whatever flash codes they use to initialize the flash, it also assumes the kernel is signed with the same key and checksums so youd be able to put the new kernel past the hypervisor, or it assumes you have a way to initiate a flash locally (from an xex) which also would be infinitely more difficult because the xex could not be run from any burned media
-
QUOTE(TheSpecialist @ Dec 3 2005, 10:15 AM)

Just load it from HD, no problem

how would you get it there? hopefully an FTP server is developed BEFORE the update would be distributed
also hope MS doesnt run checks on xexs loaded from the HD too (since theoretically only the dashbaord and emulator need to be run from the HD)
and as i said last time that assumes its even POSSIBLE to initate a flash locally
all this hypothetical talk is pointless though, i highly doubt we'll ever crack the private key in the first place....just noticed you said the same thing a few posts ago, lol
-
QUOTE(TheSpecialist @ Dec 2 2005, 04:07 PM)

The key can't be 'hacked' by some kind of reverse engineering, only thing you can do is brute force it. Good luck with that

I'll buy you a beer if you find it before 2010

And why try to crack the key from the original xbox ? I'd rather have the one from the xbox 360

"Very good possibility" ? If we have the private key from the 360, then we can run ANY code on the xbox 360, from any medium ! Nobody would need to hack his/her xbox anymore, you could just dl the iso from internet and play it on your 'unhacked' xbox, what more could you possibly wish for ?

But really, forget about hacking the private key, it's just not feasible ...
It might not be feasible but we better get somebody started on it. If a year goes by and we still haven't hacked the xbox in anyway, we will be a year ahead on cracking the private key. It is always good to have a backup plan.
-
QUOTE(JoHnnyTK36 @ Dec 3 2005, 11:52 AM)

If a year goes by and we still haven't hacked the xbox in anyway, we will be a year ahead on cracking the private key
great, then it wil lonly be 99,999 years to go after that
but in order to get started on cracking the private key we need the public key, which i believe would have to be ripped from the kernel, which we dont have either
-
wouldn't it be an idea to try to crack the private key parallel to tranditional cracking attempts. So if one fails we have an backup plan? I see that this could be difficult but wouldn't be a project like the seti@home with a lot of distributed computing perfect for this? If we only go some thousand computers to share the work load it could be done in a year or so. No security is perfect, also not the Private Key Security if there is enought processing power to crack it.
Don't get me wrong, I don't have an XBOX360 and don't even plan to buy it but I'm verry interrested in helping you crack this box, just the trick MS 
Think about it... What calculations are needed to do such cracking? Who has a sever in the carribean where we could host the distribution coordination? I think if someone showed me how to crack such a key (even with lots of processing power) then I might be able to write a distributed computing system to crack it.
-
QUOTE(huhn @ Dec 4 2005, 11:40 AM)

wouldn't it be an idea to try to crack the private key parallel to tranditional cracking attempts. So if one fails we have an backup plan? I see that this could be difficult but wouldn't be a project like the seti@home with a lot of distributed computing perfect for this? If we only go some thousand computers to share the work load it could be done in a year or so. No security is perfect, also not the Private Key Security if there is enought processing power to crack it.
Don't get me wrong, I don't have an XBOX360 and don't even plan to buy it but I'm verry interrested in helping you crack this box, just the trick MS

Think about it... What calculations are needed to do such cracking? Who has a sever in the carribean where we could host the distribution coordination? I think if someone showed me how to crack such a key (even with lots of processing power) then I might be able to write a distributed computing system to crack it.
Even if you'd link up ALL the PC's in the world, you wouldn't find it before you die
Well, of course it depends on the development of computer power, but based on current hardware, you won't find it in 100 years. So let's just say that its 99,99% sure that you won't find it before the next generation XBOXes are introduced
So, like I said before, it's just not feasible.
-
found an article that describes a new method of finding primes.
might be an interesting read for some of you math majors. maybe you could improve the algorith so we can crack taht private key 
http://www.ams.org/n...a-bornemann.pdf
if you have firefox, use bugmenot to get in.
-
QUOTE(azninvasion @ Dec 5 2005, 06:58 PM)

found an article that describes a new method of finding primes.
might be an interesting read for some of you math majors. maybe you could improve the algorith so we can crack taht private key

Uh, no.
Finding primes has never been the problem. It's very easy to find a prime. It was unknown until recently whether proving primality is in P, the set of all problems which can be solved in polynomial time. But that didn't really matter... proof of primality wasn't a problem. The general algorithm for finding a large prime is this: pick a large random number. Run a primality test that will certainly succeed if the number is prime, but may either fail or succeed if the number is composite. If the test fails, throw out the number and start over. If the test succeeds, run another primality test. Keep running primality tests... if the number passes several hundred of them, the odds of it being composite are negligible and the number can be safely assumed prime.
This algorithm is not in P, because it would theoretically take an infinite amount of time to prove primality using it... but again, for cryptographic purposes, 99.999999999999999999% certainty is plenty good enough. Agrawal, Kayal, and Saxena, on the other hand, found an algorithm for testing primality that is in P. It's a tremendous breakthrough, of which they should be very proud. But from a practical standpoint it matters little, and it doesn't make it even a tiny bit easier to factor large composite numbers, which is what would be involved in breaking RSA.
And as I said in a different post, if and when somebody finally does solve the problem of factoring large composite numbers, we'll wish they hadn't. Hooray, you can play with your $400 computer, yippee! Also, Internet security will go bye-bye, secret military communications will be open to our enemies, digital signatures will be trivially forged, and an awful lot of things we take for granted will be no more. Worth the tradeoff?
-
QUOTE(VoiceOfReason @ Dec 5 2005, 10:08 PM)

Worth the tradeoff?
Hmm...
The fate of the free world...
Or browsing the web on my 360...
Tough choice. 
I guess the world will just have to hang in there as best as it can.
-
Tossing out an idea and you can throw it in the garbage bin if its already been tried.
Say you are given a multiple of two prime numbers of the same binary length. And you use the binary multiple, and you add some numbers to it to where it is no longer a multiple of those two binary numbers. Now get me wrong, if you find multiples of two numbers that are of the same binary length that form to make this new number you have created. Can't you use that as an estimate to find two binary prime numbers in the vicinity of these two new numbers you have and eliminate a lot of work?
-
QUOTE(azninvasion @ Dec 6 2005, 02:06 PM)

Tossing out an idea and you can throw it in the garbage bin if its already been tried.
Say you are given a multiple of two prime numbers of the same binary length. And you use the binary multiple, and you add some numbers to it to where it is no longer a multiple of those two binary numbers. Now get me wrong, if you find multiples of two numbers that are of the same binary length that form to make this new number you have created. Can't you use that as an estimate to find two binary prime numbers in the vicinity of these two new numbers you have and eliminate a lot of work?
that assumes the 2 numbers multiplied to make the public key are of similar length, which they almost certainly arent, due to it being a logical starting point for cracking the key
-
-
QUOTE(VoiceOfReason @ Dec 6 2005, 03:41 PM)

For crying out loud. People still don't get the size of the numbers we're talking about here.
Okay, fine, you've done some magic and come up with an estimate for one of the factors. Let's say it's a really good estimate... it's within 0.000000001% of the actual factor! You've still got to deal with about 10^295 potential factors, and even if every single person on the planet was doing nothing but trying them out, and even if each person was capable of trying out a googol (that's a 1 with 100 zeroes after it) factors per nanosecond, it would still take much, much, much longer than the entire age of the universe to find the factor.
Give it up on trying to factor the key. Better men than you have tried.
hey i understand the size, lol, i even posted the public key in another thread, lol, its on the order of 10^600 (2*10^616 to be exact)
im just trying to explain in a way he woul dunderstand why it wont work
-
never say never i will never give up! to the grave!! sure its a big number, but nothing is ever tooo big.. i mean it won't be the end of the world if rsa keys are factored in a novice way. we'll just have q-bits to secure everything then.
-
Well if someone does manage to find a way to break this encryption in general, then they should keep their progress to themselves or they'll be assassinated.
-
Not saying that it can or will be cracked.
BUT, if some of the toughest sercurity was cracked because some people want to put their games on the xbox instead of carring the disc's, i would just have to laugh.
-
QUOTE
never say never i will never give up! to the grave!! sure its a big number, but nothing is ever tooo big.. i mean it won't be the end of the world if rsa keys are factored in a novice way. we'll just have q-bits to secure everything then.
Please tell me you are joking, and are not still actually thinking about this. Why does not anyone listen to the VoiceOfReason, which I better add, is the best name for this situation.
-
QUOTE(azninvasion @ Dec 4 2005, 08:36 AM)

I doubt it will take 10 years to crack the private key. In 5-6 years i'm betting nano cpu's which will be 1 million times denser will render all current forms of security useless.

not necessarily, as one would just make a bigger key, one that would take the "nano cpu's" you mentioned just as long to crack as current ones.
Note: this agrees (still--nothing is changed) with the last post made by lumpkin
-
QUOTE(LumpKin666 @ Jan 4 2006, 03:59 PM)

It could be possible that the very first value tested is the correct value, thus making the whole process of cracking this thing take 1 nanosecond.
Yes, this is possible. It is also possible that you might win the Lotto. Fifty times in a row. The latter is a lot more likely than finding the key in the very first value you check. Or the very first billion values you check.
QUOTE
Statistically, it's never going to happen. But insisting that it is completely impossible is silly.
I don't recall saying that it's a theoretical impossibility. But it certainly is a practical impossibility. True, you might get lucky. The odds of this are so incredibly tiny that if it happened, it would be the unlikeliest thing to ever have happened in the history of the universe.
QUOTE
There's no saying that the value that you're looking for is actually going to be the LAST possible value.
This is true. Statistically speaking you can expect to try about half the possible values before you find the key. This means that instead of taking an average of ten skillion gajillion hooptibillion years, it'll only take five skillion gajillion hooptibillion years. Big improvement.
QUOTE
Heck, why not let people try?
Uh, I'm not preventing anybody from trying, any more than I'd prevent anybody from wasting his time on any other useless endeavor.
QUOTE
You'd completely crap yourself if, by some glorious act of supreme power, someone stumbled into the correct value in a couple weeks.
Yep, I most certainly would. But I think my clean white underwear is pretty safe.
-
VoiceOfReason
You sound like you would be a good programmer,
but you would be a awful social worker.
99.99+ members on this site aren't hackers and never will be, however they still want to feel like they are contributing.
I own a assisted living home,
and found that people are happier, and live far longer, when they feel they are helping.
I have one lady that loves to wash the dishes, it makes her feel needed. And after she goes to bed,
I pull all the dish back out and re wash them. Everyone is encouraged to pitch in.
My residents live, on average far longer than what they would in other homes that don't allow resident to help.
Feeling like your needed, pulls communities together. This project could only make this community better.
Hell maybe the project would get "slashdotted" which would bring more members, and maybe some more real hackers.
To make the long story short, either they can do something that has little chance of success, but feel part of the community, or nothing at all.
I know your mind is set in your beliefs,
but some times you need to forget about Statistics, pay your dollar, and get you quickpick.
I choose "7" as my prime number for the private key.
-
QUOTE(billygoatz @ Jan 5 2006, 07:15 PM)

VoiceOfReason
You sound like you would be a good programmer,
but you would be a awful social worker.
99.99+ members on this site aren't hackers and never will be, however they still want to feel like they are contributing.
I own a assisted living home,
and found that people are happier, and live far longer, when they feel they are helping.
I have one lady that loves to wash the dishes, it makes her feel needed. And after she goes to bed,
I pull all the dish back out and re wash them. Everyone is encouraged to pitch in.
My residents live, on average far longer than what they would in other homes that don't allow resident to help.
Feeling like your needed, pulls communities together. This project could only make this community better.
Hell maybe the project would get "slashdotted" which would bring more members, and maybe some more real hackers.
To make the long story short, either they can do something that has little chance of success, but feel part of the community, or nothing at all.
I know your mind is set in your beliefs,
but some times you need to forget about Statistics, pay your dollar, and get you quickpick.
I choose "7" as my prime number for the private key.
very good, very very good, now you see, i do know the possibilities of us finding said key are 1000000000000000000000000000000000000000000000 to one if not greater, but i do also encourage this kind of additude, you dont win a game of football by sitting on the sidelines being a mopey little bitch about how you dont think the play will work, you get on the field & try it (unless you're a 49ers fan), furthermore, if anyone wants to set up a mainframe for calculating the results (kinda like the neo project) i'll gladly connect my pc until said key is cracked
-
I feel the same way about the whole thing. Some are hackers and some aren't. Those that aren't sometimes give ideas to hackers they themselves don't know how to do. Actually, my friend developed a C++ program that not only tries to get the private key, but logs the fails in text.
We have yet to actually get it running because it involves inserting the public key in the code which cannot be processed. Anybody have any idea how to get around this?
-
Voice is not just trying to put people down, he is telling it the way it is. The damn key is not going to be cracked, just get over it. Like he says go ahead and try but nothing is going to come of it, there is a reason why this is used in governments and the like.
-
QUOTE(billygoatz @ Jan 6 2006, 04:15 AM)

VoiceOfReason
You sound like you would be a good programmer,
but you would be a awful social worker.
99.99+ members on this site aren't hackers and never will be, however they still want to feel like they are contributing.
I own a assisted living home,
and found that people are happier, and live far longer, when they feel they are helping.
I have one lady that loves to wash the dishes, it makes her feel needed. And after she goes to bed,
I pull all the dish back out and re wash them. Everyone is encouraged to pitch in.
My residents live, on average far longer than what they would in other homes that don't allow resident to help.
Feeling like your needed, pulls communities together. This project could only make this community better.
Hell maybe the project would get "slashdotted" which would bring more members, and maybe some more real hackers.
To make the long story short, either they can do something that has little chance of success, but feel part of the community, or nothing at all.
I know your mind is set in your beliefs,
but some times you need to forget about Statistics, pay your dollar, and get you quickpick.
I choose "7" as my prime number for the private key.
What the hell.... We are on a realistic xbox modding site. Not on some Dr. Phill episode. We are not here to please everyone or try to make people live longer. What are you on?
-
ouch...you've just shortened my life with 2 hours.... that hurts
-
The ICE team or something put there website online...
They say they have a direct boot soldering solution, website opens tommorow...
Don't think this is real but could be real
http://www.icemodchip.com
RE: Think it's fake, it has indeed the same owner as the infinity website
they allmost got me here
-
I think it's a billion times more likely MS leaks the key themselves, than that we are going to find it...
-
all I was asking for was some advice on how to make the number smaller so that it can be processed.
who the hell ever said my friend or I would be succesful at this? We know that our chances of getting the key is
100000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000
000000000000000000000000000000000000000000000000000000000000000000000000
to one.
-
QUOTE(VoiceOfReason)

Yes, this is possible. It is also possible that you might win the Lotto. Fifty times in a row. The latter is a lot more likely than finding the key in the very first value you check. Or the very first billion values you check.
i wass gone make the same remark like you. that was its likelyer that you win the lotto before you find the key.
I don't know shit about hacking, ok i know a little bit. And i find Its cool to see all so eager to hack the new box.
And in away, ms challenged us by saying we build a hackproof system. but there a lot of kids with nifty toys.
thats like saying where better then you.
A few days ago i seen alot of 360 info on the net, all where saying xbox hacked 28 dec. ok the video's where fake.
but that day the kiosk disk made day light. now there are these strange rumours about a mod chip been relased 1ste of jan, now there postponed to 31 of jan. no photo's where relased because of securitie reasons. in fact this is funny for security reasons
there been some phone calls the website is up today tomorow we get more info etc..
This is all good news or is it?
its cool that we can run or own apps on the xbox360, but i din't follow the "programs dev" forum on 360
are the 360 progs written?
The other good news why its good news. is because we can run ower bacups because the 360 like"s scratching dvd's.
This had nothing to do with how good the 360 security but i follewed the forum very close and i got to say nothing new for me so gone get me some
just some thing to say about the hole xbox 360 crazy hackingnis
Ciao
-
If you are going to comment about the forums being flodded with crap, dont post crap yourself about brute forcing the key, IT IS NEVER GOING TO HAPPEN. Wow you wrote a nice C program, just everyone stop about the damn key.
-
I know I should listen to the voiceofreason on this but I was browsing the forums and saw my thread has crept back up. That got me thinking about primes again, and I think I have come up with a solid theory on factoring primes, (at least with the smaller numbers) and want to get some input on it. I was writing this down as notes to myself but I think I should share it. I hope I don't get assassinated,
. Well here it goes, enjoy!
If any number can be formed by the multiplication of prime numbers, than can the converse be true? That is to say, to find one prime number we must divide it by another prime?
The question is how we determine this prime number without trying n primes in order to arrive at the solution to the problem.
Suppose we were given two prime numbers. 17 and 19 and whose sum is 323.
Can we determine this without a successive try at division?
Lets try adding 1 number to this term to end up with 324.
What is the largest divisible term?
Well we factor out the problem.
2,2,3,3,3,3
That is 2x2x3x3x3x3 = 324
Note that we took the high end of the estimate.
Now we shall take these factors and distribute them evenly
2,3,3,3,3,2
So split down the middle, we have 2,3,3 and 3,3,2
And multiply them out
18 and 18
Now since we added 1 we will add or subtract one from each side to find the primes.
Once the primes are found we will test to see if their sum is equal to the first number.
17 and 19 = 323
Does this work for much larger prime multiplication, or primes that are different?
Well lets see.
Try 7 and 23
161
Add 1
162
Factor
2,3,3,3,3
Now we notice that the numbers are not evenly distributed which may mean that the two primes are not as close as in the previous example.
Now we have two choices
2,3,3,3,3 which will be pairs 2,3 and 3,3,3 or 2,3,3 and 3,3
We choose the first
2,3 = 6 and 3,3,3 = 27
6 is between primes 5 and 7
27 is between primes 23 and 29
We test the multiples of these 4 and we find 7 and 23 to be the correct answer equaling 161.
So the steps are simple.
1. Add numbers to the prime to make it even, and do a prime factorization of this number.
2. Group these prime factors into two groups.
3. Multiply the factors in each group to arrive at two numbers.
4. Choose a range to be tested around these numbers.
5. From this range select the closest primes.
6. Test those primes from the first and second groups and see if their multiples are the number being tested for.
7. If it does not match, return to step 2 and rearrange the factors.
8. If step 7 fails choose to subtract numbers or something.
9. Have yourself a nice cold beer.
-
QUOTE(azninvasion @ Jan 7 2006, 10:59 PM)

That got me thinking about primes again, and I think I have come up with a solid theory on factoring primes
Oh, factoring primes is easy. Given a prime number N, its factors are 1 and N. It's factoring composite numbers that's a problem.
QUOTE
If any number can be formed by the multiplication of prime numbers, than can the converse be true? That is to say, to find one prime number we must divide it by another prime?
I'm not quite sure what you're saying here. The idea that any number can be expressed as a unique product of primes is known as the Fundamental Theorem of Arithmetic, and yes, the converse is true: every possible product of primes results in a unique number.
QUOTE
Suppose we were given two prime numbers. 17 and 19 and whose sum is 323.
Lets try adding 1 number to this term to end up with 324. What is the largest divisible term? Well we factor out the problem. 2,2,3,3,3,3
Okay, here's the first problem. You're trying to solve the problem of factoring 323... why should the ability to factor 324 be taken as a given? Granted, you know that by adding 1 to an odd number you'll definitely have the factor 2... but if instead of trying to factor a number with 3 digits you were trying to factor a number with 300, trying to factor the next number up isn't necessarily going to be a piece of cake.
By the way, the term for the result of a multiplication is "product", not "sum."
QUOTE
So split down the middle, we have 2,3,3 and 3,3,2 And multiply them out 18 and 18
Now since we added 1 we will add or subtract one from each side to find the primes.
Does this work for much larger prime multiplication, or primes that are different?
Nope. It doesn't necessarily even work for smaller numbers.
QUOTE
So the steps are simple.
Okay. Let's factor 57.
QUOTE
1. Add numbers to the prime to make it even, and do a prime factorization of this number.
57+1 = 58 = 2*29
QUOTE
2. Group these prime factors into two groups.
3. Multiply the factors in each group to arrive at two numbers.
Okay. 2 and 29.
QUOTE
4. Choose a range to be tested around these numbers.
5. From this range select the closest primes.
The closest prime to 2 is 3. The closest primes to 29 are 23 and 31.
QUOTE
6. Test those primes from the first and second groups and see if their multiples are the number being tested for.
7. If it does not match, return to step 2 and rearrange the factors.
There's only one possible arrangement.
3 * 23 = 69, nope.
3 * 31 = 93, also nope.
QUOTE
8. If step 7 fails choose to subtract numbers or something.
9. Have yourself a nice cold beer.
Okay, let's subtract. 57-1 = 56 = 2*2*2*7. Let's try 2*2 and 2*7. The primes around 4 are 3 and 5. The primes around 14 are 13 and 17. None of these multiply to 57. Try 2*2*2 and 7. The primes around 8 are 7 and 11, the primes around 7 are 5 and 11. Again, no dice. 2 and 2*2*7? Then we get 3 at one end, 23 and 31 on the other. Still no joy. None of these lead you to 3*19.
I agree, though, that step 9 makes sense and is a good idea.
-
Ah the VoiceOfReason wins over again! Woohoo at least I know the feds won't be coming for me after all. Yeah I didn't really take time to think about it but I suppose it wasn't an entirely lost cause. Ah thy ponder upon thee pesterous prime, and marvel upon thy wonders. What secrets hideth thee? Wilst thou alloweth me to know? Pitty.
-
not to be rude, but i dont think you guys should be attcking the 360 with its own protection, lets ay they kisko demo
we can brew our own app/virus tha would burn a whol right threw all the bull and cut right down to the core and then plant a new bios, sort of like a softmod, right after it tears a wholeit would engadge on the network from your pc to the xbox and thats all i have so far,
maybe add a new app from there that is more secure
-
QUOTE
we can brew our own app/virus tha would burn a whol right threw all the bull and cut right down to the core and then plant a new bios, sort of like a softmod, right after it tears a wholeit would engadge on the network from your pc to the xbox and thats all i have so far,
maybe add a new app from there that is more secure
not to be rude, but do you even have the slighted clue what you are talking about here?
we cant run any homebrew apps/virus/code/anything as it wont be signed
"burning a hole through the bull" and "cutting to the core" wtf are you talkign about?
ok, so you want to plant a new bios...how? what do you think all the modchip devs are trying to do? its alot easier said than done
-
though the firmwere
and i wasn't talking with the kisoks disc pasficly, but like run it of somthing of that sort, maybe of a memory card of some sort
and the 360 is like a server if you think of it
u can cut right threw the secruity if u have the right program and screw around with it and make it your own
-
well i am sure we could definatly modd the 360 with a devolpment kit
i wounder how uyou could get a hold of one of those from M$?
how hard could it be, we are amking somthing for the 360
progress for technoligy
-
a dev kit will only help you write homebrew code for the 360, it wont help in hacking it (getting that code to run)
all im really getting from you is "all we need to do to hack the 360 is hack the 360" your not providing any new insight, just talking in circles
-
I like hamburgers.
-
i Like [IMG]http://www.bobs.com.br/images/produtos/04-double-cheeseburger_G_.jpg[IMG/]
-
?? Hamburgers ?? I thought the discussion was about the 360 security and the private key leading into the battle of wits over prime numbers but no where did anyone bring up Lunch!
-
Its impossible for me to jump to the moon aswell but it doesnt hurt me trying...
Still I wouldnt spend any time on it...