27c3: Console Hacking 2010 (en)
Speakers: bushing, marcan, sven
PS3 Epic Fail
Over 70 million Wiis, over 40 million Xbox 360s and over 35 million Playstation 3s have been sold in the last few years. That makes over 145 million embedded devices out there and most of them are just used to play games. But what can you do with them if you don't like playing games? You hack them to make them run your own code of course! We're going to talk about the various hacks that you can use to gain control of your hardware and make it do what you want it to do.
2010 saw the first hacks for the Playstation 3, soon after Sony removed Other OS functionality. We will detail the operation of current PS3 exploits, show a few new ones and explain where and how Sony went wrong when designing its security system, and show how these holes can be used to gain control over the system and bring Linux back to the PS3.
We will also go over hacks for the other consoles, including the JTAG hack for the Xbox 360 which made running homebrew code more convenient, and the cat-and-mouse games that Nintendo played with us to combat Wii hacks. We might also check out the security of their 'new' handheld console - the DSi.
Gamers might find this talk interesting even though it is targeted at those who hack (or design) embedded system security. A basic knowledge of crypto is therefore assumed. We will also be present in the Hackcenter before and after the presentation for those of you who are interested in learning more about the subject.
For more information visit:http://bit.ly/27c3_information
To download the video visit: http://bit.ly/27c3_videos
Видео 27c3: Console Hacking 2010 (en) канала Christiaan008
PS3 Epic Fail
Over 70 million Wiis, over 40 million Xbox 360s and over 35 million Playstation 3s have been sold in the last few years. That makes over 145 million embedded devices out there and most of them are just used to play games. But what can you do with them if you don't like playing games? You hack them to make them run your own code of course! We're going to talk about the various hacks that you can use to gain control of your hardware and make it do what you want it to do.
2010 saw the first hacks for the Playstation 3, soon after Sony removed Other OS functionality. We will detail the operation of current PS3 exploits, show a few new ones and explain where and how Sony went wrong when designing its security system, and show how these holes can be used to gain control over the system and bring Linux back to the PS3.
We will also go over hacks for the other consoles, including the JTAG hack for the Xbox 360 which made running homebrew code more convenient, and the cat-and-mouse games that Nintendo played with us to combat Wii hacks. We might also check out the security of their 'new' handheld console - the DSi.
Gamers might find this talk interesting even though it is targeted at those who hack (or design) embedded system security. A basic knowledge of crypto is therefore assumed. We will also be present in the Hackcenter before and after the presentation for those of you who are interested in learning more about the subject.
For more information visit:http://bit.ly/27c3_information
To download the video visit: http://bit.ly/27c3_videos
Видео 27c3: Console Hacking 2010 (en) канала Christiaan008
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Console HackingPS3 Devkit Downgrading to firmware 0.85Console Hacking 2016 (33c3)27c3: Reverse Engineering the MOS 6502 CPU (en)25c3: Console Hacking 2008: Wii Fail22C3: "Xbox" and "Xbox 360" HackingThe Search for the Perfect Door - Deviant OllamGuarding Against Physical Attacks: The Xbox One Story — Tony Chen, MicrosoftDEFCON 17: Stealing Profits from Spammers or: How I learned to Stop Worrying and Love the SpamHow a CPU works and Introduction to Assembler - bin 0x04Hack All The Things: 20 Devices in 45 MinutesHacking the Game Boy cartridge protection34C3 - Console Security - Switch35C3 - Smart Home - Smart HackDefcon 21 - How my Botnet Purchased Millions of Dollars in Cars and Defeated the Russian HackersElectronics Reverse Engineering Walkthrough - Hacking the Monoprice Select Mini 3D PrinterOHM2013: Attitude and Action from KPN SecurityDEFCON 17: Lockpicking ForensicsDEFCON 16: Toying with Barcodes29C3: Hacking Cisco Phones (EN)