![]() |
![]() |
![]() |
![]() |
![]() |
||||||||||
|
||||||||||||||
![]() |
#1
|
|||
|
|||
![]() As far as I know part of the XBOX protection was a TEA driven one. I heard the TEA encryption has a vulnerability. Anyone knows something about it (i know its related to the 32th and 64th bits)
any code will be welcomed as well :lol:
__________________
*"Carpe Noctem" *"Crackers don't sleep, They idle" [img]http://www.geocities.com/crackingil/ree.jpg[/img] |
#2
|
|||
|
|||
![]() This link: http://news.zdnet.co.uk/software/developer...,2123851,00.htm
talks about how TEA was used to hack the xbox, but not alot about the exploit itself. Im sure google would be glac to dig up some more info for you. Crudd [RET]
__________________
Just another freak, in the freak kingdom. |
#3
|
|||
|
|||
![]() I've tried google . I'm looking for a technical reference :wink:
__________________
*"Carpe Noctem" *"Crackers don't sleep, They idle" [img]http://www.geocities.com/crackingil/ree.jpg[/img] |
#4
|
|||
|
|||
![]() This video (800+MByte) explains almost all sides of XBOX protections and how people defeat them:
http://media.ccc.de/filez/congress/2005/le...ing.mp4.torrent You must use a Bittorrent client. |
#5
|
|||
|
|||
![]() |