Relies on USB. Edge case, not happening in the wild.
Comment on Any Xbox 360 can now be hacked in less than one minute
Aielman15@lemmy.world 1 day agoIt’s not a dumb video and it’s not an edge case. It’s a great video that goes straight to the point, has timestamps, explains in detail how the exploit works and how consistently, and showcases it.
The exploit is BadUpdate v1.2, an evolution of the previously known BadUpdate, which was great as a proof of concept but not very useful in practice, as it required an average of 30 minutes to work, had a success rate of about 30%, and needed to be applied every time the console was rebooted (on a console with no sleep mode, may I add).
By comparison, as shown in the dumb video, the new version of BadUpdate works flawlessly in about a minute max, and has a far greater success rate of about 80%, according to the creator. It can be launched from a USB stick and requires no additional software or hardware modification to the console, and most importantly, works on all X360 and not just earlier editions.
If you’re too lazy to click on a link, fine, but I’d suggest at least not acting so confidently when saying things you know nothing about.
CallMeAnAI@lemmy.world 16 hours ago
Aielman15@lemmy.world 13 hours ago
You should re-read the discussion, because I’m pretty positive you didn’t even get the topic.
We are talking about being able to play pirated games and homebrew apps on the X360. Of course that doesn’t happen in the wild. Unless you think that I woke up one day with a modded PS1.
AnUnusualRelic@lemmy.world 1 day ago
It’s strange that console exploits wouldn’t work consistently on identical hardware with identical firmware. What is it that makes it fail so often?
Aielman15@lemmy.world 1 day ago
Quoting from the GitHub’s page:
Which means that, sometimes, you run the code but it simply fails. When it happens, you can turn off the console and try again.
AnUnusualRelic@lemmy.world 1 day ago
Oh, ok. That makes sense.
DevCuber@sh.itjust.works 1 day ago
If i remember correctly, some memory address that needs to be overridden by the exploit is randomized on startup. The only way to find it is to just write to a random address, which often fails