Games Consoles Security and Forensics Challenges
Games Consoles Security and Forensics Challenges
Games Consoles Security and Forensics Challenges
Ghadrdanizadi, Alireza
BSc 2nd Year Student- Computer Networks
University of East London, School of Computing, IT and Engineering
Abstract: The new generation games consoles have proved that human imagination is unlimited.
Millions of kids, teenagers many adults are entertained by these advanced and amazing games.
Apart from providing fun to game lovers, these gadgets have also captured the interests of
hobbyists, hackers and crackers and cyber criminals. The high processing power and the ease of
modification have attracted such users in modifying these devices to do things that the
manufacturers never intended. Today Xbox, PlayStation, Wii game consoles and their successors
are the most powerful processing devices in a household. Among them Xbox and Xbox 360 have
been the mostly modified devices to date. These devices can be hardware and/or software modified
to run as personal computers, FTP servers, Web servers, etc. This has led to the rise of an alternate
storage device for people cybercriminals to hide their illicit data as suspicion rarely arises of data
storage on such devices. This research paper aims to discuss Xbox security and forensics
challenges.
1. Introduction
With the expansion of broadband internet technologies to rural areas, the world has shrunk and
become a global village. Information and Communication technologies (ICT) in the current world
have brought people far away in different continents. ICT has improved the quality of human life
significantly and it is evident in our day to day activities. But at the same time, the facilities
provided by the advancement of ICT are also considerably subject to misuse.
Today, the new generation game consoles have become the most powerful processing devices in
any home. Their high end processing power along with internet connectivity has made these
devices eye-catching to many cybercriminals. Such a community have explored the Xbox, its
successor Xbox 360, Nintendo Wii and Sony PlayStations in order to modify them to do things that
they were not intended to do [1]. They have modified such devices using Modchips and software
exploits to run as powerful computers by installing customized software and operating systems.
Among these devices which are mostly subject to modification are Xbox and Xbox 360. This is due
to their close resemblance to personal computers with a processor, hard drive, DVD drive, Ethernet
and USB (through a connector) and the most easiest to modify [1].
A modified XBOX has the potential to be used as a personal computer, file server, web server, etc
[2]. There are a wide range of Linux distributions that can be deployed on Xbox game consoles.
This has lead to the rise of an alternate storage device and an invisible computer (though a visible
game console) for people involved in illegal activities in order to use it for malicious purposes and
hide their illicit data.
Even though Microsoft has stopped the production of the original Xbox games consoles, the
cumulative sales of 24 million game units scattered all around the world [3] and the lack of
knowledge on Xbox forensics make this a serious issue in the perspective of law and order. There
have been incidents where evidential information was found on game consoles [5, 6]. Little has
been published, however, on the proper forensic procedures to determine whether an Xbox has been
modified and, if so, how to create a forensic duplicate and conduct a proper digital forensics
investigation [1]. This was the motivating factor to choose Xbox Forensics as the subject of this
research.
Xbox 360
Custom IBM PowerPC-based CPU with three Symmetrical Cores at 3.2 GHz
512 MB RAM
20 250 GB Upgradable Hard Disc
100 Mbit Ethernet and Wi-Fi 802.11a/b/g
3 USB 2.0, IR port
From the above discussions about the, it is evident that seventh generation devices processing
power and other capabilities overwhelm the other processing devices in the household. Amongst
the four game consoles discussed above, it is obvious that Xbox and Xbox 360 strongly resembles a
personal computer. Besides being the easiest game consoles to modify, it is no wonder why they
are modified more often.
Microsoft implemented certain security measures to ensure that Xbox could only be used for its
sole purpose; playing games and nothing other than that. However, Michael Steil [23] detailed
some of the weaknesses in an article 17 Mistakes Microsoft Made in the Xbox Security System.
Steil [23], indicated that the security mechanism is implemented as a chain of trust that could be
outlined as follows;
The CPU starts execution of code stored in the secret ROM.
The secret ROM decrypts and verifies the second boot loader.
The second boot loader decrypts and verifies the Windows kernel.
The Windows kernel checks the allowed media bits and the RSA signature of the game.
Xbox has a very secure encryption mechanism that prevents from executing random codes. All
Xbox executable files (.xbe files) are signed with 2048 bit RSA algorithm. Even if a single bit is
altered it would reflect a change in the signature. Therefore only code signed by Microsoft could be
run and all other code that doesnt match the signature would be rejected by Xbox kernel. So the
modification community began to look for vulnerabilities to exploit rather than trying break the
RSA security.
This is particularly an issue for the forensic investigators as an unlocked Xbox hard disc would
generate errors when attempted to image, whereas generally a working condition hard disc could be
acquired without any problems.
An Xbox hard disk can be removed like an ordinary computer hard disk, however, when imaging in
a locked state, the drive would not be detected [21]. Chris Vaughan [22], proposed four methods to
overcome this problem. One of them is hot swapping the Xbox hard disc to a forensic workstation
for imaging once it is booted without any disc in the DVD ROM, so that the hard disc would be
unlocked.
But this poses the risk of making a permanent modification on the hard disc or destroying hard disc
data. Craiger [1] proposed a forensically sound procedure to acquire the hard disc, which is to boot
the Xbox using Xebian bootable disc and acquire the image of the hard disc from a Linux computer
networked to the Xbox. The basic idea is to image the Xbox hard disc using dd and acquire it
through a Secure Shell (SSH) connection. But it is highly recommended that one needs to use
multiple types of CD-RW, DVD-R and DVD-RW to boot Xbox since the DVD ROM of XBOX
might not detect some discs.
In addition to any of these games a USB memory stick with a USB to Xbox connector/ Xbox
memory card and Action Replay software are needed. In this research a USB memory stick was
used and Splinter Cell game was chosen as this is the most recommended one. The Krayzie Ndure
exploit was downloaded from the internet. Next step was to load the game exploit to the USB
memory stick. This needed some modifications to USB stick. It is important to specify that some
game exploits apply only to certain versions of Xbox, but Krayzie Ndure exploit applies to any
Xbox regardless of its kernel version [28].
Xbox works on FATX file system. Therefore there is a need to convert the USB memory stick to
FATX file system. To do this the USB stick was connected to an Xbox through a connector. Inside
the dashboard, in memory an error message was displayed indicating that the memory unit wasnt
working properly and was formatted. So now the USB stick is formatted to FATX file system.
Thereafter the USB stick was connected to a personal computer. Next step was to install Action
Replay Software. It is this software that is used to copy the gamesave exploits to our USB stick. It
is not possible to directly copy it because it is now in FATX which is not recognised by Windows
XP or any other operating system. So Action Replay was downloaded and installed. Thereafter a
small hack was done to convert our USB stick compatible to Action Replay Software. The
following was done to make it compatible.
USBView was installed on a XP machine. In USBView the USB stick was selected and its
idVendor and idProduct values were copied. Next a file named xbreader.inf in the Action
Replay software installation directory was opened and its VID_ and PID_ values were replaced by
idVendor and idProduct values respectively. The xbreader.inf file was saved and closed. Figure
below,
Figure 1 USB to Action Replay Memory Card Conversion step 1
Next a driver that supports Xbox memory sticks was created. Figure below,
Thereafter Action Replay software was installed and the game exploits were copied to the USB
stick as in Figure 3. Then the USB stick was again connected to the Xbox. Both the game saves
were copied to Xbox Hard disk. Next Splinter Cell game was loaded and the Linux profile was
chosen to load. Then after few seconds of screen going blank the Unleashed X screen comes up.
EEPROM was backed up and installed Evolution X dashboard on the Xbox.
When the Linux gamesave was loaded, it exploited the buffer overflow vulnerability and ran the
hacking code to take control over the system and started Unleashed X dashboard. That is, the stack
was overwritten by the input data and eventually code execution pointed to the code embedded in
the gamesave. The installed Evolution X dashboard supports FTP, Audio Songs and even custom
applications can be installed on to it. But even though Evolution X was installed the option to load
the original Xbox dashboard exists and still works. So now the Xbox could even boot any Xbox
Linux DVDs while playing games as well, Figures 4, 5 and 6.
With Evolution X or Unleashed X dashboard installed on Xbox, can be used as a file server to
upload and download files through FTP or it can even be modified to install a Linux distribution
and use it as a Linux computer or even use it as a web server, etc. Once the original Xbox is
modified through a soft mod, Xbox Linux distributions can be installed, just like installing them on
a personal computer. Xebian, Gentoox, Gentoo, XFedora, xUbuntu are some of the Linux
distributions that can be installed on Xbox [29] .It can also be used to hide files. For example a
person can upload illicit files to Xbox through FTP connection in order to hide data in Xbox.
Conclusions
Xbox forensics is still in its preliminary stages. More research has to be conducted in the
identification and analysis stages. Major forensic suites should develop support for FATX file
system. Technology is evolving at a rapid speed with newer and superior powered game consoles
introduced to markets everyday. The more powerful these game consoles are released, the more
high capabilities they possess, the more they are subject to modification and misuse.
It will not be long for ordinary game users to uncover the potential of these devices and attempt to
modify them. With Xbox 360 already in the market for more than four years, still there is a lack of
research in the field.
References
[2] Burke, K, P. and Craiger, P. (2007) Xbox Forensics, Journal of Digital Forensic Practice, 1:18
pp 275- 282
[6] 52.62 Million Wii game consoles sold all over the word,
http://www.nintendo.co.jp/ir/pdf/2009/090730e.pdf, Last visited Nov. 2010
[8] Wii game console specification, http://www.whatconsole.co.uk/wii.php, Last visited Nov. 2010
[10] 24.6 Million PS3 game consoles sold all over the world,
http://news.softpedia.com/news/PlayStation-3-Will-Catch-Up-to-the-Xbox-360-in-2011-
118402.shtml, Last visited Nov. 2010
[14] 31 Million Xbox 360 game consoles sold all over the world,
http://uk.gamespot.com/news/6216343.html?tag=recent_news;title;5, Last visited Nov. 2010
[15] Xbox game console specification, http://reviews.cnet.com/consoles/xbox-video-game-
system/4507-10109_7-7853769.html?tag=mncol;rnav, Last visited Nov. 2010
[21] Collins, D. (2009) XFT: a forensic toolkit for the original Xbox game console, International
Journal of Electronic Security and Digital Forensics 2(2) pp 199 205
[22] Vaughan, C. (2004) Xbox Security Issues and Forensic Recovery Methodology, (Utilising
Linux), Digital Investigation 1 pp165172.
[24] McClure, S. Scambray, Joel. and Kurtz, George. (2005), Hacking Exposed: Network Security
Secrets and Solutions, Fifth Edition, pp 218 222