Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
XBox (Games)

Hackers Dodge Xbox Live Shutout 71

An Ars Technica post at their games column Opposable Thumbs points out that, despite Microsoft's best efforts, hacked Xbox 360s are once again playing on Xbox Live. "Steadfast in their pursuits, the hackers of the Xbox 360 scene have managed to best Microsoft's Xbox Live Banning protocol: a system of checks in place to identify hacked Xbox 360s and deny them access to the Xbox Live Network. The current method of hacking the 360 involves exploiting the firmware of the DVD drive (the preferable method), and this latest patch does just that. In fact, the creators are so confident in their breakthrough that the info file remarks that the new firmware 'defeats all current and some future Xbox Live detection attempts.'"
This discussion has been archived. No new comments can be posted.

Hackers Dodge Xbox Live Shutout

Comments Filter:
  • The person you are about to shoot may be playing on a hacked xbox, Do you want to continue?
    • Why does everyone assumes hacked xbox as bad? They might simply be hacked to add more features and play homebrew video games.
      • Re: (Score:2, Insightful)

        by Rude Turnip ( 49495 )
        It's bad if they're on Xbox Live, which is a private, paid for network where the users are paying for reliability and consistency in a level playing field (ie no wall hacks). No one is going to go through the time or expense to look into the intended use of every hacked console. If a hacked console doesn't go on Xbox Live, then there is no issue.
        • by StikyPad ( 445176 ) on Thursday May 31, 2007 @07:12PM (#19345369) Homepage
          Actually, the hack in question only allows the use of copies. There is an exploit which allows the execution of unsigned code, but it only works on a specific version of the kernel. Connecting to Live would automatically update the kernel (dash console), which would patch the exploit. So any claims that they are protecting against bots and cheats is pure FUD, since bots and wall hacks *do not exist* on the 360 (at this time); at least none that would work on Live.

          Eventually another unsigned code vulnerability may be found (which is what you would need to run a modfied client), but this will almost definately not be a result of modifying the DVD-ROM firmware.
          • by DrSkwid ( 118965 )
            I definitely agree.
          • by Drantin ( 569921 ) *
            Are all the data files used by the signed executable signed as well? Can those be modified?
          • BZZZZT sorry, try again, thanks for playing though

            Sorry, I didn't mean to come off like a jack-ass but this is a very common misconception. You're absolutely right that they can't run unsigned code, but unfortunately most games only sign the executables... This leaves some games VERY open to things like wall hacks or other modifications of the content itself.

            Why don't you ask Bizarre Creation how they liked trying to deal with the people racing the neon green 600HP E class cars with infinite lateral g
      • Re: (Score:3, Informative)

        by Ewan ( 5533 )
        Hacked XBox 360s can only play copied games, there's no other additional features and no homebrew games exist, as the hack still only lets you run signed code from Microsoft.
        • Textures aren't signed.. you can still do wall hacks by changing the wall textures to be transparent.
        • by baadger ( 764884 )
          Are you saying that after almost 2 years the 360's code signing hasn't been cracked?
          • Meh, it took nearly three years for the DS cart encryption protocol to be broken. These things take time.
    • by C. ( 20089 )

      The person you are about to shoot may be playing on a hacked xbox, Do you want to continue?
      Maybe not, but I wouldn't be surprised by:

      The person who just shot you may be playing on a hacked xbox, Do you want to continue?
  • The hackers have more manpower than Microsoft. It's also worth noting that they're probably more skilled than the XBL engineers.

    Even if Microsoft had 1000 people working on this, the hackers would still be ahead. It's impossible to estimate how many people take a shot at console hacking just for the hell of it.

    Inevitably, the hackers dominate just about any platform. That's just the way it works.
    • by Phil246 ( 803464 )
      not necessarily. It would be reasonable to assume microsoft has a log of which xboxes were hacked, and xbox live is a client-server based system no?
      All they have to do is block them on the server instead of telling the console to block themselves and the hackers are at step 0 again.
      • by Wicko ( 977078 )
        If this is true, why hasn't it been done already? I imagine there is some way to edit whatever ID's your xbox as yours.
    • Re:Once again... (Score:5, Interesting)

      by Drogo007 ( 923906 ) on Thursday May 31, 2007 @05:56PM (#19344587)
      Not necessarily true. Hacking can get you a long way, but eventually it usually breaks down.

      Case Study: A game I was part of the dev team for held an online, sponsored tournament. The four finalists were flown to Hawaii where they competed head to head on rigs provided by the company for the championship. One of the final four had been playing phenominally online, yet once he got to Hawaii, his game fell completely apart. He complained endlessly about how the computer he was playing on was different from what he was used to at home. Yet the other three players didn't complain at all. This guy got completely, embarassingly destroyed in the finals. And we eventually patched the hole he'd used to cheat his way to the finals.

      But don't miss the fact that only 1 out of the 4 finalists was a cheater (I believe first place won $50,000 with a shot at a million-dollar challenge). The other three were simply legitimately good players.
      • A determined hacker could have still broken your game (disassembly, DLL-injection, etc).

        It's just a matter of the amount of effort someone is willing to put forth.
        • The point was that the game was broken, but that didn't help the cheater in the end, when he had to play on someone else's (the sponsor's) PC under supervision.
          • ... play on someone else's (the sponsor's) PC under supervision.

            Heheh... the XBox360 is feels a bit like this too... public key crypto, CPU Efuses, mandatory updates....

        • Re: (Score:1, Insightful)

          by Anonymous Coward
          If you start modifying files on a rig provided to you by the competition(one on which you may not have administrative access), you're taking a much larger risk than by simply cheating on Internet games.

          If you're caught by some automated detection system, you can always have plausible deniability, even if you're still banned: automated detection systems sometimes have false positives, viruses can install questionable software on your computer without your consent, etc. As far as reputation goes, this is stre
      • Re: (Score:2, Insightful)

        by bubblejet ( 957207 )
        So the cheater didn't win, but he still got a free trip to Hawaii. Sounds to me like he did pretty well.
      • Re: (Score:3, Insightful)

        by Guppy06 ( 410832 )
        "Not necessarily true. Hacking can get you a long way, but eventually it usually breaks down."

        Only for those who are later required to play on somebody else's hardware.

        "But don't miss the fact that only 1 out of the 4 finalists was a cheater"

        Oh, I don't miss it, I just wouldn't use the adjective "only." It suggests that at least 1/4 of the players in your game were cheaters, potentially as many as 100%-3. It also suggests that your security was so slipshod that you allowed a cheater to get so far as the f
      • by cgenman ( 325138 )
        Yup. Cheaters never win. Poor guy had to console himself with the notoriety, the excitement of competition, a free trip to Hawaii...
      • by rtechie ( 244489 )
        Not necessarily true. Hacking can get you a long way, but eventually it usually breaks down.

        99% of players do not, and will not, compete in tournaments. Perhaps 10% engage in online tournaments. From what I have seem (I don't play XBOX live that much), cheating is insanely rampant in online shooters like Halo and Ghost Recon. I've played maybe about 50 games of Halo and 100 of Ghost Recon, and I would say there was some sort or cheating or "griefing" (if the host was losing he's quit, etc.) in at least hal
    • Its also worth nothing that I can make up any "facts" I want and assert them as true, but that doesn't make them so.
  • Hmm (Score:3, Insightful)

    by JMZero ( 449047 ) on Thursday May 31, 2007 @06:04PM (#19344691) Homepage
    As far as I know, the mod in question only allows users to play "backups" of games - not to run arbitrary code (including cheats). So the concerns of people cheating are a little off the mark. As is the idea that the detection could really be moved to the server side - any detection regimen is going to have to look at the drive's firmware or some characteristic of the disk and this looking is going to be done at the client end.
    • Re: (Score:2, Insightful)

      by hidannik ( 1085061 )
      Could not a backup have modified game assets on it, such as (also noted elsewhere) transparent textures allowing the hacker to see opponents behind walls?
      • by JMZero ( 449047 )
        I hadn't thought of that - it should be doable assuming the content isn't signed as well (and I wouldn't think it would be). This sort of cheating should be reasonably easy to detect via forced updates (easier than the drive firmware sneakiness at least), but it's sad anyway.
    • by Rayonic ( 462789 )
      Apparently there is an array of cheats you can do in Gears of War if you edit come .cfg files on your pirated copy of the game. Probably lots of other stuff possible too, in general.
  • People with hacked Xbox 360s still need to buy a new system in order to play online. So it's really not all that bad for Microsoft. When they defeat _this_ hack, then all people with those hacked boxes would have to buy yet another Xbox. What would really screw up Microsoft's banning efforts is if people managed to change their console IDs. Then banning a console ID would put a regular Xbox 360 out of commission, and the banned one would just change to a different good ID again.
    • Re: (Score:2, Interesting)

      by Ponzicar ( 861589 )
      Remember that Microsoft sells 360s at a loss, making up that loss with game sales and live accounts. If someone buys a new 360 and only plays pirated games on it, Microsoft would only make money from the live subscription. Thus it's still bad for Microsoft.
  • It's good to read the hackers are continuing to fight for our rights to not only pirate (yeah, I know there are a lot of anti-pirate people here, I don't blame them one bit for being steadily opposed) games, but get access to the online community through a modded system. I've always wanted a modded console, but I know if that were to happen I would end up buying pratically nothing brand-new other than like maybe one or two games a year total across my systems, and I own every sytem except the wii. Even if I
  • by ADRA ( 37398 ) on Thursday May 31, 2007 @06:22PM (#19344917)
    We're seeing Trusted Computing at its finest.

    Trusted Computing: noun
    The act of trusting that any possible attack vector against a computers expected behavior will be done so by those that have nothing better to do than to game the system.
  • Deja vu (Score:1, Informative)

    by RiskyChris ( 999242 )
    I've heard that line before. Weren't the last firmware hacks designed to be "undetectable by Microsoft"?
    • by Akrat ( 827951 )
      The last firmware mods were advertised as fully detectable by Microsoft. That was said from the beginning, so it's no surprise by these people that they were finally banned.
  • It is _not_ impossible to cheat, you can modify ini files to do it.*

    I know that PGR3 and Gears of War being hacked in such a way its quite possible there are many more games.
    Now this still may just be an excuse from MS though quite frankly they dont really need one, virtually the only other purpose of a modchip is piracy.

    Either way cheating _is_ possible it _has_ been done and banning the modders _will_ stop it regardless of why you really think they have started the bannings.

    *There may be other files you c
  • by Vexor ( 947598 )
    do this [penny-arcade.com] with the hack?
  • Clearing up some FUD (Score:3, Informative)

    by BenJeremy ( 181303 ) on Friday June 01, 2007 @12:59PM (#19353705)
    A couple of things:

    1) To re-iterate what others are saying, the firmware hack does not defeat executable signatures, so the integrity of game code has not been compromised, however, game data files can be, and have been, compromised (Exo's GoW hacks). The simple solution is to update the executable with hard-coded data file checksums to go along with their weak signature security (in this case, on the GoW data files). So it's not entirely true that the firmware hack doesn't allow cheaters - but Microsoft has other avenues they can pursue in preventing cheaters. This wave of bannings represents an escalation in Microsoft's policy toward modders.

    2) Something that many here miss, is that Microsoft has no direct access to the firmware for some models of the DVD drive they are using. Toshiba-Samsung MS28 drives, for example, have "Firmguard" - an attempt to thwart modders that has backfired on Microsoft. Why? Because powercycling the DVD with the correct VIA SATA chipset bypasses Firmguard as part of it's "Bad Flash" recovery mode. Microsoft cannot do this on the 360. This means they cannot read, nor write firmware to these drives.

    There were several techniques Microsoft employed against modders in this last wave, verified by special debugging firmware employed - Microsoft was using an anomaly in the firmware's fetch of special sectors to determine if backups were employed (moddded Hitachi drives gave up the goods on this one), as well as more strict checking of those sectors (catching non-"stealth" backups), and finally, using Challenge/Response commands to do threshold timing (many used slower or faster timings on the firmware, which was detectable as being outside of thresholds).

    There are still less reliable checks Microsoft may employ, but that dragnet will scoop up some legitmate users, too (No DVD Error code check, used to see who's been using their Xbox 360 as a power supply for the drive as they flashed it). If I was on the team, I'd rule that one out. There are a few other techniques, which I won't mention, since they haven't been discussed publicly, as the others I mentioned have (besides, Microsoft KNOWS how they are checking currently) - which have been identified and "fixed" in the current iXtreme 1.0 firmware.

    For what it's worth, many, many 360 modders have NOT been banned. It may be these checks were only performed when they were actively playing a backup on Live... no pattern has emerged, and much of the data is suspect (panicky users, usual liars, etc...).

    If Microsoft wants to defeat cheaters, all they need to do is employ a couple of interns to surf the scene sites for hack news, then simply order up special bannin' updates for those hacked games, to detect cheater's data files and ban those specific machines. Future game releases could incorporate some security libraries to make data files more secure (the code currently cannot be hacked).

    • For what it's worth, many, many 360 modders have NOT been banned. It may be these checks were only performed when they were actively playing a backup on Live... no pattern has emerged, and much of the data is suspect (panicky users, usual liars, etc...).
      I'm curious now - from what you are saying, it's only when you play a backup on Live that it performs the check? So either playing a backup offline or playing a legitimate game online is fine?

Our OS who art in CPU, UNIX be thy name. Thy programs run, thy syscalls done, In kernel as it is in user!

Working...