{"guid":"import-49fe42523b9cb3d932","title":"Console Hacking 2006","subtitle":"Xbox 360, Playstation 3, Wii","slug":"23C3-1606-en-console_hacking_2006","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1606.en.html","description":"\"Next Generation\" gaming consoles should not be limited to games, they have powerful hardware which we want to exploit for our needs. The talk gives a hardware overview of each of the 3 consoles, an overview of their security systems, as well as an update on hacking the Xbox 360, which has been on the market for about a year.\n","original_language":"eng","persons":["Felix Domke"],"tags":["23c3"," Hacking"],"view_count":727,"promoted":false,"date":"2006-12-28T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2026-03-28T16:45:06.319+01:00","length":3025,"duration":3025,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1606-en-console_hacking_2006.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1606-en-console_hacking_2006_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-49fe42523b9cb3d932-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-49fe42523b9cb3d932-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1606-en-console_hacking_2006","url":"https://api.media.ccc.de/public/events/import-49fe42523b9cb3d932","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":17},{"event_id":1090,"event_guid":"import-c5bd70ae7c91327ae4","weight":5},{"event_id":1106,"event_guid":"import-b27048411397f630ff","weight":3},{"event_id":1172,"event_guid":"import-80587c27422ce87793","weight":3},{"event_id":1230,"event_guid":"import-ea090c27e22f1eaf1e","weight":19},{"event_id":1315,"event_guid":"import-317788719156ce0058","weight":20},{"event_id":1487,"event_guid":"import-31618b1a3c02facb8d","weight":23},{"event_id":1800,"event_guid":"gL8lRFVpn8NFFfATsOn7Bw","weight":12},{"event_id":2534,"event_guid":"0e66ac36-d9c6-4900-b532-4f651dd39582","weight":3},{"event_id":2837,"event_guid":"9f2e9ff0-1555-470b-8743-9f07f54e9097","weight":11},{"event_id":3629,"event_guid":"686b1941-b211-4902-b4c4-1d642398e08b","weight":5},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":23},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":4},{"event_id":5638,"event_guid":"bc119064-0b23-443b-82d4-55719d478151","weight":4}],"recordings":[{"size":133,"length":3025,"mime_type":"audio/mpeg","language":"eng","filename":"23C3-1606-en-console_hacking_2006.mp3","state":"downloaded","folder":"audio","high_quality":true,"width":640,"height":480,"updated_at":"2014-05-10T15:26:41.090+02:00","recording_url":"https://cdn.media.ccc.de/congress/2006/audio/23C3-1606-en-console_hacking_2006.mp3","url":"https://api.media.ccc.de/public/recordings/1969","event_url":"https://api.media.ccc.de/public/events/import-49fe42523b9cb3d932","conference_url":"https://api.media.ccc.de/public/conferences/23c3"},{"size":133,"length":3025,"mime_type":"video/mp4","language":"eng","filename":"23C3-1606-en-console_hacking_2006.m4v","state":"downloaded","folder":"video","high_quality":true,"width":640,"height":480,"updated_at":"2016-01-27T11:03:23.379+01:00","recording_url":"https://cdn.media.ccc.de/congress/2006/video/23C3-1606-en-console_hacking_2006.m4v","url":"https://api.media.ccc.de/public/recordings/1968","event_url":"https://api.media.ccc.de/public/events/import-49fe42523b9cb3d932","conference_url":"https://api.media.ccc.de/public/conferences/23c3"}]}