Lemmy Fans
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
MazonnaCara89@lemmy.ml to Reverse Engineering@lemmy.ml · 2 months ago

Hacking the Xbox 360 Hypervisor Part 1: System Overview

icode4.coffee

external-link
message-square
0
link
fedilink
  • cross-posted to:
  • [email protected]
1
external-link

Hacking the Xbox 360 Hypervisor Part 1: System Overview

icode4.coffee

MazonnaCara89@lemmy.ml to Reverse Engineering@lemmy.ml · 2 months ago
message-square
0
link
fedilink
  • cross-posted to:
  • [email protected]
Diving into the heart of the Xbox 360 security system: the hypervisor. How does it work? Why is it so secure? Find out the answers to these questions and more as I cover the architecture of the Xbox 360 hypervisor and hardware security features that made it nearly impenetrable for 20 years.
alert-triangle
You must log in or register to comment.

Reverse Engineering@lemmy.ml

reverse@lemmy.ml

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: [email protected]

Reverse Engineering

Community to share or talk about RE. Clean, simple and without nonsense.

Community Rules

  • Stay on the topic or open your own thread.
  • No spoon-feeding.
  • No re-posts, unless original source is offline or existent thread cannot be edited because you are not the owner.
  • No racism or racist stereotypes.
  • No tracking in links or ip-loggers/grabbers. Clean URLs only (without ref).
  • No conspiracy theories or misinterpretations.
  • Avoiding Logical Fallacies - Logical fallacies are errors of reasoning - specific ways in which arguments fall apart due to faulty connection making.
  • No endless quoting, or community ban, make your point but do not argue without anything just because you want to be right.
  • No trolling, or community ban. I have no time to play the Kindergarten Cop, this also extends to abusing of Lemmy’s report function, you will be excluded from this community if you create drama with bogus reports.
  • No NSFW of any kind unless it is to spot NSFW e.g. via A.I./ML without showing actual NSFW content. Example. Reversing tools like this or show guidance is okay with me.
  • Law regarding reverse engineering.

Useful Tools

  • x64debug
  • Ghidra
  • radare2
  • GNU Project Debugger
  • Cutter
  • EDB (Evan’s Debugger)
  • REDasm
  • Boomerang decompiler
  • Medusa - Disassembler

Useful Resources

  • List of reversing resources
Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 1 user / day
  • 1 user / week
  • 25 users / month
  • 36 users / 6 months
  • 1 local subscriber
  • 186 subscribers
  • 21 Posts
  • 1 Comment
  • Modlog
  • mods:
  • CHEF-KOCH@lemmy.ml
  • BE: 0.19.11
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org