Hexmaniac
Members-
Content Count
4 -
Joined
-
Last visited
Community Reputation
0 NeutralAbout Hexmaniac
-
Rank
RMS Freshman
-
Since UWP was available the first thing I thought was just to edit it to access the restricted area of the Xbox. Unfortunately, having not enough time and sufficient knowledge in the field of computer science I could not blur my idea. Of course with the ODK we can do everything we want but if people like Xenomega don't post their exploits in time the future of a CFW on XB1 is very far.
- 11 replies
-
- virtual disk images
- xvd volumes
-
(and 1 more)
Tagged with:
-
Of course, to get access on a Xvc it's the dream of everyone and it's almost impossible to do that on a PC with an Xvc file. Unfortunately even if you have an Xbox one with an old OS like the 10.0.15063.2019 (exploitable pre-patched OS) you can't run the UWP app offline. The OS mandatorily ask you to connect to internet, to get the access to your profile and it obliges you to update the Xbox (Microsoft security system). So at now the program.cs posted by the David Pokora aka Xenomega, is doubly useless. Maybe if he had posted his discovery before, somebody else could have contributed to the study of the file system or how these damn XVC works. Just for the record and obviously OT, how many of you have ever tried to dump the Nand of an Xbox one?
- 11 replies
-
- virtual disk images
- xvd volumes
-
(and 1 more)
Tagged with:
-
As I thought, this news is doubly useless.
- 11 replies
-
- virtual disk images
- xvd volumes
-
(and 1 more)
Tagged with:
-
Hi, this news is incredible but l don't understand what means: "Patched as of 5/5/2017: 10.0.15063.2022 (RS2_RELEASE_XBOX_1704.170501-1052). Thus in accordance with responsible disclosure". Maybe it means that this exploit is patched with the update of the 5/5/2017? In this case it would be useless and why make the exploit public once the microsoft has patched it? Anyone can help me to understand? Thanks in advance
- 11 replies
-
- virtual disk images
- xvd volumes
-
(and 1 more)
Tagged with: