Latest Rare Witch Video
The latest Rare Witch video is available. It's our first one on the Xbox 360, and paves the way for many more to come. It's also the first Rare Witch Video available in High Definition. I hope you like it.
Vehicles Around Town Mumbo is fed up that Banjo and Kazooie have all this creative power at their fingertips, but can't use it in Showdown Town. He knows there's only one solution... contact The Rare Witch Project to hack the game. YouTube HD Download 1280 x 720 HD (120MB) Download 720 x 480 (36MB) |
I call hax.
|
Very nice, Awesome in fact, but these videos always are :D
|
How did he...
What the fuc.. ... HAX |
Address please?
|
I'm downloading it now! How did you record it? I've always wanted to record videos of my games, but I've never been sure what equipment I need.
|
Haha brilliant, probably your best one yet! Rare definitely do need to give you mention in their next game :)
|
Just output to a DVD recorder and copy to a computer. That's the easiest way.
|
that was awesome.
|
Feels great to see another RWVideo. :D Awesome work.
I like how this one has a little story with it - I've always favored the more creative hack videos. |
Send me the blueprint to the penis-mobile =D
|
That was an awesome video! I cracked up at the wang-wagon.
Now, the most obvious question.......how do we common folk get to use decent vehicles in SDT? :) |
Upload the cheat save dammit!
|
DLing now.
EPIC I PM'd Ice and asked if I put it on my youtube. If I can't I'll just remove it. I have about 100 avid subscribers to feed Banjo-Bites |
Quote:
|
Ice...epic. :p
|
Quote:
|
This is one of the best videos I've watched in a long time. Period.
|
Was that a gigantic, squirting, massive replica of a rocket ship?
|
How much hacks can a hacker hack if a hacker can hack hacks?
|
6 eggs and a key. Odvious, rune
|
Quote:
|
Great work Ice! It's the story line that makes this video so awesome!
|
This is win. :)
|
HoW wAs It ReCoRdEd?/?/?/?/
|
Wow, I'm slow. Downloading now. :D
THAT WAS AWESOME. |
Do you use C++ to hack it? How do you hack an Xbox game? Like, how do you access the code? Plop it in your computer and run some sort of program? I'm so confused.
Epic video, though. |
I disassemble the Xbox 360 executable file, and then after examination I modify the assembly.
|
How exactly do you access the executable in the first place?
|
You can either rip it from the disc, or extract it from an iso available from the interwebs. wxRipper does the trick either way. You can then use xextool to unpack the sections of the executable, or use Xex Support for IDA to load it straight into IDA without any modification.
|
That was funny. Great job!
|
In before Ice finds the real SNS in BK: N&B.
|
In before CK finds that Ice has already found the real SNS in BK: N&B. :p
|
Wow Ice..you have put a lot of effort in this one. But it will be easy on from now one...right? So..when might we expect version 2?
|
What is IDA? Basically, is there a way that the masses will ever be able to do this. And did you also make it so you can have unlimited parts?
|
IDA is Interactive Disassembler
It is unlikely the masses will be able to do it. Depends if the 360 itself gets properly hacked. Also, yes I have unlimited parts. |
So... what do you mean by properly hacked, and what is the way to hack it currently?
|
I was referring to modding your dvd firmware so it can run backups. It's not the actual 360 that is compromised, just the dvd authentication. So, at the moment no, there is no way for the masses to be able to do it. The 360 is a very secure machine, so I doubt we'll see anything, but I guess we'll see.
|
Well, could you make a patch to the CD file that we could download and do if we have hacked Xboxes already? I would assume there is a way past the authentication in the disks on this one, Nero had a way of doing it on the original Xbox...
|
No, because Xbox 360 executables are signed, and as soon as you modify any part of it, the signature authentication will fail. There is no way of resigning modified executables because only Microsoft know the key.
This authentication process is done on the 360 cpu itself. It has nothing to do with being able to run the program from different media. |
All times are GMT. The time now is 03:58 PM. |
Powered by vBulletin® Version 3.8.9
Copyright ©2000 - 2024, vBulletin Solutions, Inc.