treeprofit.blogg.se

Trinity hacking tool
Trinity hacking tool













trinity hacking tool
  1. #TRINITY HACKING TOOL PC#
  2. #TRINITY HACKING TOOL PS3#

Thanks Microsoft, you pretty much allow us to connect the 360 disc drive on our PC and lets us flash it, awesome job! They didn’t even bother making their own proprietary ports for the 360, they use standalone SATA ports that every other PC disc drive uses, and there’s something we know about PC’s disc drives: we can flash the firmware. So how can we come up with a hack on the disc drive? simple: connect it to your PC. So, we have the added extra security of not being able to replace the disc drive, at least not the motherboard, which is just there to annoy people. So you have the same key but in two different places, at this point you can guess that the system simply compares them. The way married boards work is simple: the motherboard has a special key that is unique to each system, and the disc drive board has the same exact key stored in it. We certainly don’t have one motherboard for both system and disc drive, but the two motherboard we have are tied together so that you can’t easily separate them without the system complaining.

trinity hacking tool

#TRINITY HACKING TOOL PS3#

In modern systems, specially the PS3 and 360, we have a hybrid combination at hand. Now we understand these hacks work and that some 6th gen system separated main system board from disc drive board, essentially giving us the opportunity to choose which one of those to hack, but modern machines have an extra layer of security. This GameCube hack falls into the category of a hack that forces the disc drive to ignore the protection on the disc and send the “incorrect” signal to the system that the disc was “ok” to boot, when in reality we were booting a completely unlicensed game. Why am I talking about GameCube hacks in a 360 hacking page? well aside from filler, it is needed to understand one of the first 360 hacks. In the case of the Dreamcast there was no need to hack any of them as another, better, software-based hack was found, in the case of the GameCube there were mostly modchips to fool the system itself, until Xeno-GC came out, which was a great piece of hardware hack: it had a very easy installation process and allowed for the same functionality as any other BIOS modchip. On most older systems this had to be done on the system itself due to the fact that the disc drive controller was on the same motherboard as the rest of the system, where the BIOS/OS is, but there were a few exceptions like the Dreamcast or the GameCube, which had separate motherboards for the system and the disc drive. So we are facing the problem that we cannot craft our own discs to be just like legit ones, we have two options at this point if we want to achieve disc-based hacks: either we hack the drive so that it ignores the disc protection and always tells the system that it’s booting a licensed game, or we hack the system itself so it ignores the disc drive telling it that the disc is not legit, in either way, we should end up with the system being fooled one way or the other. Hardware makers can use special and closed machinery to craft game discs in a way that allows the system to differentiate them from standard discs and drives, and since this information is usually closed and the hardware/process involved in creating the discs is strictly locked behind doors, it is almost impossible for outsiders to replicate the structure a legit game disc has to be able to bypass the protection. It’s simple: the game disc has something special that no other disc has and the laser drive is customized to be able to tell this difference, essentially letting the underlying BIOS or OS know if the disc is legit or not. The 360 is no strange from at least a few of these options, and I’m gonna do a quick sum up of some of interesting hacks before I get to my main one.įor consoles with optical discs, the disc reader is an essential and important sector in preventing piracy and unlicensed games.

trinity hacking tool

If we have learned something from previous consoles is that there are a few different ways of hacking that can be applied to almost all of them: tricking the BIOS or OS into either ignoring the security or thinking it has passed, tricking the reader into telling the BIOS/OS that the security measures have been met, tricking a legit game into loading our own code, and many other. Before I get to that, let me show you some important 360 hacks that, while I do not care for them, they are actually pretty cool. Along with the PS3, the Xbox 360 was a really tough machine to hack, but it still fell victim to hackers, specially due to a big time mistake made by Microsoft.















Trinity hacking tool