Bibliographic record and links to related information available from the Library of Congress catalog.
Note: Contents data are machine generated based on pre-publication information provided by the publisher. Contents may have variations from the printed book or be incomplete or contain other coding.
Acknowledgments README.1ST The Video Game Console Market About Hackers and Hacking The Politics of Hacking The People Behind the Hacks Chapter 1 VOIDING THE WARRANTY Tools of the Trade Tools to Open Things Up Tools to Attach and Remove Components Tools to Test and Diagnose Tools for Design Deconstructing the Xbox Step 1: Safety First Step 2: Remove Case Screws Step 3: Remove the Top Cover Step 4: Move the Disk Drives Step 5: Remove the Disk Drives (Optional) Re-assembling the Xbox Chapter 2: THINKING INSIDE THE BOX Reading a Circuit Board Circuit Board Basics Components Test Points Xbox Architecture High-Level Organization Functional Details Pattern Matching Comparison: Xbox Versus the PC Contrast: Xbox Versus the Gamecube Chapter 3: INSTALLING A BLUE LED What You'll Need Removing The Xbox Front Panel Removing the Front Panel Circuit Board Installing the Blue LED Re-Assembling the Front Panel Debugging Chapter 4: BUILDING A USB ADAPTER Starting Materials Strategy Implementation Chapter 5: REPLACING A BROKEN POWER SUPPLY Diagnosing a Broken Power Supply Replacing the Power Supply Strategy Procedure Building the Xbox Power Cable Installing the Replacement Power Supply Operating with the Replacement Power Supply Debugging Tips Chapter 6: THE BEST XBOX GAME: SECURITY HACKING First Encounters with a Paranoid Design To Snarf a ROM An Encounter with Microsoft Analyzing the ROM Contents Chapter 7: A BRIEF PRIMER ON SECURITY Who Needs Security, Anyways? A Brief Primer on Cryptography Classes of Cryptographic Algorithms The Rest of the Picture Chapter 8: REVERSE ENGINEERING XBOX SECURITY Extracting Secrets From Hardware Eavesdropping a High Speed Bus Making Sense of the Captured Data Chaper 9: SNEAKING IN THE BACK DOOR Back Doors and Security Holes Visor Jam Table Attacks MIST Premature Unmap Attack Microsoft Retaliates Reverse Engineering v Security The Threat of Back Doors Chapter 10: MORE HARDWARE PROJECTS The LPC Interface LPC Interface on the Xbox Using the LPC Interface The Other MB of SDRAM Xbox-VGA Mass Storage Replacement Chapter 11: DEVELOPING SOFTWARE FOR THE XBOX Xbox-Linux Installing Xbox-Linux "Project B" OpenXDK Chapter 12: CAVEAT HACKER Caveat Hacker: A Primer on Intellectual Property by Lee Tien Classical Intellectual Property Law: An Overview The Traditional View of Reverse Engineering New Challenges for Reverse Engineers The Responsible Hacker: Ignorance is no Defense Reverse Engineering as "The Freedom to Tinker" and other Legal Issues Chapter 13: ONWARD! The Hacking Community Hacking Fora Making a Contribution Trusted Computing Taking a Step Back Palladium versus TCPA Hacking the Trusted PC Looking Forward Concluding Thoughts Chapter 14: WHERE TO GET YOUR HACKING GEAR Vendors for Hobbyists Prepared Equipment Order Forms Chapter 15: SOLDERING TECHNIQUES Introduction to Soldering Use Flux Starter Tips Surface Mount Soldering Technique for Simple Components Technique for Complex Components Technique for Removing Components Chapter 16: GETTING INTO PCB LAYOUT Philosophy and Design Flow Refining your Idea Schematic Capture Board Layout General Placement and Routing Guidelines CAD Tools Board Fabrication Companies Sierra Proto Express Data Circuit Systems Advanced Circuits Alberta Printed Circuits Starter Projects Chapter 17: GETTING STARTED WITH FPGAs What is an FPGA? Designing for an FPGA Project Ideas Where to Buy Chapter 18: DEBUGGING: HINTS AND TIPS Don't Panic! Understand the System Observe Symptoms Common Bugs Recovering from a Lifted Trace or Pad Chapter 19: XBOX HARDWARE REFERENCE Power Supply Pinout Video Connector Pinout USB Connector Pinout Ethernet Connector Pinout ATA Connector Pinout DVD-ROM Power Connector LPC Connector Fan Connector Front Panel Connector Index
Library of Congress Subject Headings for this publication: Computer security, Computer hackers, Reverse engineering