Check nearby libraries
Buy this book

"Hacking the Xbox" is a fascinating book about exactly what it says. If you have no interest in gory details of JTAG probe points, cryptography, so called "trusted computing" and "digital rights management" and the technical issues at stake in trying to implement and/or attack them... then this book will bore you to tears. If you do have such interests, then you are in for a treat.
The book opens with 5 chapters of fairly broad physical overview, walking through the hardware systems in Xbox consoles and some (relatively) simple projects to get your hands dirty with a soldering iron. Then on to some meaty chapters introducing you to the security model of the platform, and the attacks that the author and others developed to ultimately succeed at running arbitrary code on these systems. These chapters provide a fascinating blow-by-blow account of the process of developing the attacks. Then, we wrap up with some practical material regarding how to use these attacks to run, for instance, Xbox-Linux on a hacked machine, and some bigger picture information on the legal environment facing US hackers interested in these matters.
Check nearby libraries
Buy this book

Subjects
Reverse engineering, Computer hackers, Computer security, Trusted computing, DRM, DMCA, Security research, Hackers, xbox, hardware, reverse, hacking, power, rom, security, soldering, solder, engineering, reverse engineering, power supply, flash rom, soldering iron, circuit board, front panel, xbox security, hard drive, boot rom, xbox motherboardEdition | Availability |
---|---|
1
Hacking the Xbox: An Introduction to Reverse Engineering
July 2003, Tandem Library
School & Library Binding
in English
0613920392 9780613920391
|
zzzz
|
2
Hacking the Xbox: An Introduction to Reverse Engineering
May 27, 2003, Xenatera Press
Paperback
0974057509 9780974057507
|
cccc
|
3
Hacking the Xbox: An Introduction to Reverse Engineering
July 2003, No Starch Press
Paperback
in English
- 1 edition
1593270291 9781593270292
|
aaaa
|
Book Details
First Sentence
"Hardware hacking may seem daunting at first because of the sophisticated tools that are required for some projects."
Classifications
The Physical Object
Edition Identifiers
Work Identifiers
Community Reviews (0)
History
- Created April 30, 2008
- 21 revisions
Wikipedia citation
×CloseCopy and paste this code into your Wikipedia page. Need help?
March 28, 2025 | Edited by ImportBot | Redacting ocaids |
December 20, 2023 | Edited by ImportBot | import existing book |
August 13, 2023 | Edited by ImportBot | import existing book |
July 6, 2021 | Edited by ImportBot | import existing book |
April 30, 2008 | Created by an anonymous user | Imported from amazon.com record |