Xbox 360 File System Decoded 225
slurpster writes "The register reports that Pi group has decoded the file system used in the Xbox 360. They write "Once you get past the protections and down to the raw bits on the disc, its just the standard xboxdvdfs, however the offset and layer breakpoint are different.""
Re:how? (Score:5, Informative)
From Wikipedias Reverse Engineering Page [wikipedia.org] I suspect that methods 1 and 2 would have been most useful for the original xbox dvd filesystem.
If your filesystem is writable, you can try:
1. Look at the volume with a hex editor
2. Perform some operation, e.g. create a file
3. Use the hex editor to look for changes
4. Classify and document the changes
5. Repeat steps 1-4 forever
(from The linux ntfs faq [sourceforge.net]
The Real Deal (Score:3, Informative)
Now, for the problem. Team Pi have released an open-source extractor FOR THEIR ALREADY-DECODED IMAGES. They have NOT released an open-source decoder for turning DVDs into images.
Why is that? I believe they probably haven't fully reverse-engineered the encryption yet. They've just cracked the raw disk driver or some other part of the XBOX360 operating system, so that it performs the decryption for them (MS's code) and saves the result to hard disk.
Needless, it won't be long before there's a public utility to run on a hacked 360 or devkit that does the same thing, then eventually someone will do the hard part - fully reverse-engineering the encryption.
Re:Owww arr Bill Gates... (Score:3, Informative)
lose, v. tr. To be unsuccessful in retaining possession of; mislay.
Know the difference!
Re:XBox "Live" Watchdog??? (Score:4, Informative)
a) Shut off the automatic connection to Xbox Live
b) Block a connection to XBL from your router
c) Unplug the ethernet cord
Not too hard
Re:huh? (Score:3, Informative)
Executable data is hashed and signed using asymmetrical keys built into the different hardware components (gpu, cpu etc). As each console has different keys "burned in", compromising one machine will mean nothing for the others!
Even if you use your electron microscope to compromise the keys of all your hardware components, using normal "man in the middle" code-injection (as mod-chips usually do) will be hard.
So there you have it
That doesn't prevent piracy of course, Chinese Entrepreneurs will line up to duplicate optical copies in about 3 seconds
Re:I hope not. (Score:2, Informative)