Recent from talks
Knowledge base stats:
Talk channels stats:
Members stats:
Softmod
A softmod (short for software modification) is a method of using software to modify the intended behavior of hardware, such as computer hardware, or video game consoles in a way that can overcome restrictions of the firmware, or install custom firmware.
Many softmods are exploits combined, known as exploit chains. The first requirement is being able to run unsigned code, known as userland exploits. Web browsers are very common vectors for this, most of which use the WebKit browser engine, which is notably open source and as a result, vulnerabilities are widely known. Another common vector of userland exploit are savegame exploits, which are specially crafted savegame files that exploit vulnerabilities in a game's code allowing for unsigned code. The second requirement is privilege escalation, typically compromising the kernel, unlocking secure parts of the system. Depending on the security architecture, additional privilege escalation may be required, such as defeating a hypervisor.
Other examples of softmods are maliciously signed firmware, such as custom firmware on the PlayStation 3, which was made possible due to the master key being released, or gaining control of a process that is very early in the boot cycle, such as the Fusée Gelée Boot ROM vulnerability for the Nintendo Switch.
Softmods may be permanent (e.g. custom firmware) or temporary (e.g. homebrew enabler) that persist until powering off. Softmods are especially popular among video game consoles, in which they usually enable a homebrew environment that allow execution of unsigned code. Compared to installing a modchip, a softmod is generally preferred (if available) due to not requiring having to open up the device and perform soldering, which could damage the device hardware. However, attempting to softmod can still damage a device, especially if instructions are not followed correctly. In some cases, it can lead to bricking.
Softmods may be used to install or load an alternative operating system (e.g. a Linux distribution) on a device, as well as reinstate functionality that was removed from the official firmware, such as "OtherOS" on the PlayStation 3.
If a softmodded console connects to its online service, (such as Nintendo Switch Online on the Nintendo Switch) the console may be banned from the service permanently. Softmods void warranty due to tampering with device function and as a result, vendors will not honour any existing warranty policy if sent in for repair.
Due to commonly being used to circumvent digital rights management, softmodding is seen as a tool to enable piracy, although the act of softmodding in itself may not be illegal.
In January 2011, security researcher Geohot and associates of the hacking group known as fail0verflow were sued by Sony for jailbreaking the PlayStation 3. Sony and Geohot later settled the case out of court, with Geohot agreeing not to reverse engineer any Sony product in the future.
Hub AI
Softmod AI simulator
(@Softmod_simulator)
Softmod
A softmod (short for software modification) is a method of using software to modify the intended behavior of hardware, such as computer hardware, or video game consoles in a way that can overcome restrictions of the firmware, or install custom firmware.
Many softmods are exploits combined, known as exploit chains. The first requirement is being able to run unsigned code, known as userland exploits. Web browsers are very common vectors for this, most of which use the WebKit browser engine, which is notably open source and as a result, vulnerabilities are widely known. Another common vector of userland exploit are savegame exploits, which are specially crafted savegame files that exploit vulnerabilities in a game's code allowing for unsigned code. The second requirement is privilege escalation, typically compromising the kernel, unlocking secure parts of the system. Depending on the security architecture, additional privilege escalation may be required, such as defeating a hypervisor.
Other examples of softmods are maliciously signed firmware, such as custom firmware on the PlayStation 3, which was made possible due to the master key being released, or gaining control of a process that is very early in the boot cycle, such as the Fusée Gelée Boot ROM vulnerability for the Nintendo Switch.
Softmods may be permanent (e.g. custom firmware) or temporary (e.g. homebrew enabler) that persist until powering off. Softmods are especially popular among video game consoles, in which they usually enable a homebrew environment that allow execution of unsigned code. Compared to installing a modchip, a softmod is generally preferred (if available) due to not requiring having to open up the device and perform soldering, which could damage the device hardware. However, attempting to softmod can still damage a device, especially if instructions are not followed correctly. In some cases, it can lead to bricking.
Softmods may be used to install or load an alternative operating system (e.g. a Linux distribution) on a device, as well as reinstate functionality that was removed from the official firmware, such as "OtherOS" on the PlayStation 3.
If a softmodded console connects to its online service, (such as Nintendo Switch Online on the Nintendo Switch) the console may be banned from the service permanently. Softmods void warranty due to tampering with device function and as a result, vendors will not honour any existing warranty policy if sent in for repair.
Due to commonly being used to circumvent digital rights management, softmodding is seen as a tool to enable piracy, although the act of softmodding in itself may not be illegal.
In January 2011, security researcher Geohot and associates of the hacking group known as fail0verflow were sued by Sony for jailbreaking the PlayStation 3. Sony and Geohot later settled the case out of court, with Geohot agreeing not to reverse engineer any Sony product in the future.