Reverse engineering Archive

libhasp: Repurposing a copy-protection dongle for general-purpose data storage

Way back in 2004, I spied an offer in Circuit Cellar magazine for a free evaluation kit from Aladdin Knowledge Systems (AKS), manufacturer of copy protection tokens. These are the little gadgets that you often need to plug in to your computer to prove that you ”really” own the particularly expensive application you’re trying to [...]

Xbox 360 Arbitrary Code Execution

An anonymous researcher has published a detailed write-up on how to execute arbitrary code with high privileges on a recent Xbox 360 kernel. The vulnerability exists in the (now patched) system call handler. There’s no googleprint for so I’m assuming this person created that email address just for the purpose of disclosing this vulnerability. [...]