Heya. I'm TwoNs. I'm sort of new to this, but I've been around lurking for a long time. I was wondering if someone could summarise what's going on with the state of the system.
From what I can tell, we are attempting to use dev mode to escalate privelleges, but to what end and have we been successful?
Avenues of attack: I'm assuming that the CD drive is protected in some way, either encrypted or won't execute unsigned code. USB ports similarly. Has IP spoofing of some form for software or firmware updates in order to get a dump of the OS?
What about controller inputs? Microsoft's adaptive controller system might leave wireless controller inputs vulnerable in some way.
Does the one system have a hypervisor? What are the main roadblocks we have here, and where should I start to investigate?
From what I can tell, we are attempting to use dev mode to escalate privelleges, but to what end and have we been successful?
Avenues of attack: I'm assuming that the CD drive is protected in some way, either encrypted or won't execute unsigned code. USB ports similarly. Has IP spoofing of some form for software or firmware updates in order to get a dump of the OS?
What about controller inputs? Microsoft's adaptive controller system might leave wireless controller inputs vulnerable in some way.
Does the one system have a hypervisor? What are the main roadblocks we have here, and where should I start to investigate?