Shadow boot ROMs on XDKs research

Discussion in 'Xbox 360 Development' started by oscar193, Mar 30, 2016.

Tags:
  1. oscar193

    oscar193 Newly Registered

    Joined:
    Aug 18, 2011
    Messages:
    2
    Likes Received:
    8
    I'm posting my research so far on shadowboot rom files that are typically used, as far as I can see, in recoveries.

    My reason for doing this was to allow a lot more control on my dev kit on later recoveries. I know of the HV expansion method but that's been patched with the newer recoveries as far as I'm aware.

    I saw a few scattered hits around the internet about shadow booting being a method to do this with no further details.

    All of my code so far can be found at: https://github.com/kimoi/XeTool

    This includes a little tool to extract information and decrypt/decompress the bootloaders.

    [​IMG]

    You'd be better off reading the code, but here's a quick summary.

    The shadow boot ROM files (typically named xboxromw2d.bin) contain a header with usual offset/length values and MS copyright, encrypted SMC and SB, SC, SD and SE bootloaders. SE is the whole HV+kernel binary, no delta patches like we find in the bootloader slots on a flash dump.

    The SMC is encrypted using a custom algo (refer to the code above or code to 360 Flash Dump Tool). The bootloaders are encrypted with RC4, using a key derived from HMAC-SHA.

    Now nothing in the ROM file seems to be signed at all. Just a simple HMAC-SHA+RC4, which we can re-encrypt w/o issues. So in theory we would be able to modify any part of the boot chain from the 2BL up.

    Unfortunately my XDK broke on me before I could actually put any of this into practise. Hopefully someone else will find this information and code useful.
     
    Last edited: Mar 30, 2016
  2. Stipo360

    Stipo360 Dead Rising & XDKs

    Joined:
    Feb 11, 2014
    Messages:
    1,107
    Likes Received:
    473
sonicdude10
Draft saved Draft deleted
Insert every image as a...
  1.  0%

Share This Page