Xbox 360 Hoaxes, Social Engineering, and Gamertag Exploits

2013 46th Hawaii International Conference on System Sciences
Xbox 360 Hoaxes, Social Engineering, and Gamertag Exploits
Ashley Podhradsky, Dakota State University
Rob D’Ovidio, Drexel University
Pat Engebretson, Dakota State University
Cindy Casey, DeSales Univeristy
primarily utilized by teenagers (PEW Internet Project,
2008) who do not possess the same reasoning
capabilities as adults (Monisha Pasupathi, Vol 37,
May 2001).
According to the Pew Research Center’s Internet
and American Life Project, as of 2008, 97% of all
teenagers (under 18 years-old) and 53% of adults (over
18 years-old) played video games on a regular basis
[4]. Additionally, of the 97% of teens who played
video games, 89% did so via gaming consoles such as
Microsoft’s Xbox 360 or Sony’s Playstation 3 (PEW
Internet Project, 2008). In a public game room, an
adult may be more cautious when disclosing personal
information, while a teenager might be more apt to
announce that his family is leaving for vacation that
upcoming Friday so that everyone listening knows his
residence will be unoccupied. Conversely, being over
18 is no guarantee that a user will not fall prey to a
social engineering scam or unwittingly reveal personal
information which will place him at risk.
In a 2005 study of more than 4,000 Carnegie
Mellon University students who utilized social
networking sites, Gross and Acquisti found that 89%
of all participants used their true names, 90.8% posted
an identifiable image on their profile, and 98.5% used
their correct date of birth (Acquisti, 2005).
Abstract
In its most basic form, social engineering can best be
summarized as the art of manipulation. By convincing
another individual to divulge sensitive information or
permit access to a restricted location, the hacker’s
ruses unsuspecting participants to achieve their goal.
In his book, The Art of Deception, Kevin Mitnick, the
infamous hacker and one time FBI fugitive, asserts that
humans are the biggest threat to security. So, if
humans are the Achilles’ heel or weakest link in
security, it is only logical that when trying to gather
information or gain access, taking advantage of
unsuspecting humans is the best place to begin. This
research will discuss how the Kevin Mitnick style of
social engineering might not be needed when most of
the personally identifying information is online. Social
engineering might not be able to obtain the same type
of information from Data at Rest (DAR) and Data in
Motion (DIM). Furthermore the paper will analyze the
privacy and identity disclosure in virtual societies,
specifically the Xbox 360. Swatting, stolen accounts,
kicking, and identity theft will be discussed.
1. Introduction
Although social engineering does not need to be
complex, and in some instances is merely a matter of
“asking and ye shall receive” (Kevin D. Mitnick,
2002), what if there were easier ways for hackers to
obtain sensitive information or make their social
engineering attacks more fruitful? When targeting
newer technologies such as gaming systems, the
weakest link may no longer be humans per se, but
rather how humans are required to use these new
technologies. Like a hexadecimal Hegelian circle,
technology and humans are an infinite loop which
continually return upon each other.
Human emotions such as trust, willingness to help
others, conformity, fear of getting reprimanded, and
personal gain, are often cited as the primary reasons
social engineering techniques are so successful (Kevin
D. Mitnick, 2002) (Mosin Hasan, Vol.2, No.2, June
2010) (Charles E. Lively, 2003) . However, this
premise attributes some level of reasoning on the part
of the individual being hoodwinked which may not be
applicable when applied to gaming consoles which are
1530-1605/12 $26.00 © 2012 IEEE
DOI 10.1109/HICSS.2013.633
2.0 Swatting
On March 6, 2012, Pennsylvanian East Allen
township resident, Lisa Yagerhofer and her family
were eating dinner when a state trooper showed up at
their front door with his gun drawn and a response
team of approximately fifteen law enforcement
vehicles on her front lawn(Swatting Hacker Uses Xbox
to Trick Police, 2012. The police were responding to a
distress call sent to the local 911 system via an instant
message which read in part: "Please help. My dad just
killed my 4 year old sister. He slit her throat. She's
bleeding to death" (Swatting Hacker Uses Xbox to
Trick Police, 2012). This is just one of dozens of
accounts of Xbox swatting which have made headlines
in recent months (Goodin, 6) (Allen, 2012) (Couts,
2011). Anyone who uses the gaming console can fall
prey to swatting, as one high-profile Microsoft Xbox
3237
3239
Live executive found out when he was victimized last
September (Heeringa, 2011).
Cyber swatting is a potentially dangerous ruse
where 911 emergency services are tricked into
dispatching emergency response services such as the
Special Weapons and Tactics (SWAT) team. Swatting
typically involves some form of caller ID spoofing
which enables the hacker to display a number which is
not affiliated with the victim’s service (FCC, 2012. In
the Yagerhofer case, the hacker acquired the Personal
Identifying Information (PII) necessary to perform his
attack from Yagerhofer’s 16-year-old son as he was
playing an online Xbox 360 game (Swatting Hacker
Uses Xbox to Trick Police, 2012), however, not all
cases of swatting involve hacking. Swatting can also
be carried out via the telephone provider’s Instant
Message Relay Service which enables the hearing
impaired to communicate with an operator through
instant messaging (Siciliano, 2010) (AT&T, 2012).
Moreover, with nothing more than a player’s gamertag,
enough information could be successfully obtained
from the Internet to carry out such malicious hoaxes.
fail to boot. Forensic analyses of Xbox 360 hard drives
revealed that while propriety data was signed and
encrypted, user data was not (Ashley Podhradsky,
2011).
4.0 Stolen User Accounts
According to a recent report by Luke Plunkett,
contributor at Kotaku Open Forums, there has been a
surge over the past few months in hijacked Xbox 360
user accounts(Plunkett, 2012). Victims are unaware
that they have been targeted until they are unable to
access their accounts (Plunkett, 2012). One such
victim, Susan Taylor, started a blog titled Hacked on
Xbox to fight back after her Xbox Live account was
hijacked earlier this year (Taylor, 2012). On her blog,
Taylor encourages other victims to share their stories
as well (Taylor, 2012). To date, out of the fifty-nine
cases posted, only eight have been resolved by
Microsoft (Taylor, 2012). There is no shortage of
reports on other gamer sites as well, including
Microsoft’s official Xbox Forums, from victims
looking for assistance (Microsoft , 2012) (Rubin,
2012). Susan Taylor, who promptly reported the
incident to Xbox requesting that they suspend her
account, found herself completely helpless because the
hijacker had changed her password and security
question (Rubin, 2012). Not only did Microsoft fail to
lock her account as promised enabling the thief to
continue withdrawing money from her PayPal account,
but to pour salt to her wound, the thief actually added
himself to her buddy list (Taylor, 2012).
When Microsoft was questioned by Dan Crawly,
staff writer for Gamesbeat, regarding the theft of his
Xbox Live account in December 2011, a spokesperson
for Microsoft responded that:
“Customers who use the same identity and log-in
details across multiple online sites and services are
more vulnerable against these everyday Internet
threats” (Crawley, 2011) .
Microsoft’s spokesperson further stated that:
“As ever, we advise customers to be vigilant, and
provide further advice on account security across
Xbox 360, Internet websites and email…” (Crawley,
2011).
These types of statements suggest that the
compromised accounts are everyone’s responsibility
except for Microsoft. They further imply that if users
exercised more caution by utilizing different passwords
and identities for their PCs and gaming consoles, they
might not fall victim to these types of incidents.
Conversely, if Microsoft earnestly believes that these
hijackings should be attributed solely to the Internet or
careless users, it appears rather contradictory then that
they would direct their customers to the Internet to
manage their billing accounts as outlined in the Xbox
3.0 Xbox 360 Architecture
While several popular gaming consoles exist,
Microsoft’s Xbox 360 is the most popular among
American consumers, selling 14.9 million consoles in
2011, eight million more than their top competitor the
PS3 (Todd Bishop, 2012). The Xbox 360 enables
users to play games and chat with others, instant
message, surf the Internet, download game trailers,
demos, games, and gaming accessories from
Microsoft’s Live Marketplace, rent movies from
Netflix, watch movies or television shows with Hulu
Plus or Comcast’s Xfinity on demand, access and post
on social networking sites such as Twitter and
Facebook, and even save to, or retrieve games from,
the cloud (Microsoft, 2012). Xbox 360 is even capable
of writing its own blog about the user’s daily activities
(Meer, 2008).
The Xbox 360 is not only similar to a personal
computer - it is actually more powerful than most
average personal computers. The file data format used
in Xbox is the FATX , an offshoot of the more familiar
FAT32 found on most legacy computers (David
Becker , 2001). Unlike the FAT32 however, the FATX
does not contain the typical backup boot or file system
information sectors found in FAT32. One reason for
this variation in file formatting is that the Xbox was
designed solely for entertainment as opposed to
productivity. Thus, redundancy and legacy support are
forfeited in order to increase the system’s speed.
Another reason is to protect proprietary data.
Microsoft accomplishes this by signing all of Xbox
360’s executable files so that if altered the files will
3240
3238
Live Terms of Use (Microsoft , 2011). Furthermore,
how careless was Xbox Live’s Policy and Enforcement
executive, Stephen Toulouse, when his Xbox Live
account was stolen (Ferro, 2012)?
The only apparent link between the victims of these
account hijackings is that they utilized Xbox Live
(Ferro, 2012). Exactly how they are being selected as
targets is unknown at this time. However, malicious
hackers are not the only individuals users need to be
wary of. The Xbox Live Terms of Use clearly state that
by using Xbox Live consumers are consenting to
permit Microsoft to automatically upload data about
their computers as well as how they use the service
(BBC, 2009). What is even more discerning is that
users are also giving their consent to allow Microsoft
to share data about them, including but not limited to,
their name, gamertag, motto, avatar, and any other PII
provided(BBC, 2009)” with Microsoft’s “affiliates,
resellers, distributors, service providers, partners,
and/or suppliers (BBC, 2009)”.
or policies, control the amount of user access to Live
services. The ports used are UDP (User Datagram
Protocol) ports 3074, 5060, and 5061 (CAI Networks,
2000). Considering that UDP is a connectionless
protocol, this could provide hackers with additional
vulnerabilities to exploit, recalling that the hacker is
targeting the player’s internet connection not the actual
gaming console, such as UDP 5060 and weak SIP or
Brute Force Attacks. Thus, when gamers who are not
familiar with NAT or VoIP weaknesses change their
settings in an effort to host games with other players,
they are unknowingly introducing more vulnerabilities
into their systems.
5.0 Kicking
Kicking is a quasi-hacking technique where an
Xbox user is “kicked” off of Xbox Live by another
player in the room. Utilizing free tools such as OXID’s
Cain and Able (OXID, 2012) password recovery tool,
the hacker is capable of gaining access to another
gamer’s IP and MAC addresses which he then exploits
to repeatedly kick the gamer off every time he tries to
connect to a game room (Images 1-3). Although
typically viewed as merely a form of malicious
harassment, the information obtained can be used to
perform more serious spoofs and attacks and should
not be taken lightly. Once the attacker has gained
access to the target’s IP address, he can then ascertain
what city and state the player is located in, the name of
their service provider, send a virus directly to the
target’s machine, or employ further reconnaissance
techniques using tools such as Nmap (Nmap.org,
2012) to secure even more sensitive data.
These booting services are also being sold to
players who are seeking to get revenge on other gamers
(BBC, 2009). What is problematic about this type of
attack is that it does not target Xbox directly, but rather
the victim’s internet connection (BBC, 2009). For
approximately $20.00, some hackers are even willing
to remotely access their customer’s PC and set these
hacking tools up for them permitting the client to target
players independent of the hacker (BBC, 2009). For an
even larger fee, these hackers will add the
compromised machine to a botnet enabling them to
perform more powerful buffering or Denial of Service
attacks against the targeted IP address (BBC, 2009).
Microsoft defines three categories of NAT on their
consoles- open, moderate, and closed. These attributes,
Image 1 – Sniffing the network with Cain and Abel, the
Xbox is detected (Microsoft)
Image 2 – Selecting IP Address to poison
3241
3239
purchasing used gaming systems from online auction
sites, identity thieves gain somewhat of an additional
advantage – the seller’s name and mailing address
appears right on the package when it arrives. Likewise,
if acquired from a classified forum such as craigslist
(Craigslist , 2012) unscrupulous individuals can amass
the seller’s name, telephone number or email address,
and various other tidbits of information by way of
social engineering.
Typically, when an individual decides to sell or
trade their Xbox console or hard drive they delete, or
erase their personal data and history believing the
information is permanently gone. However, this
common practice does not technically remove data
from the console - it merely alters it (Podhradsky,
2011). When data is deleted, it is not really erased; in
fact, it is not even necessarily moved. In most cases,
the information or file stays exactly where it was. What
changes is the path and filename of the data known as
the directory entry. The first letter of the file is
modified and marked with a character indicating it is
available to be rewritten. There it will stay intact until
new data is written over the existing data (overwriting).
More knowledgeable Xbox users may opt to
reformat the console’s hard drive in order to destroy
sensitive information. Theoretically, when an Xbox
drive is reformatted, every available block of space is
filled with zeros, or ASCII NUL bytes (0x00).
Successfully overwriting a drive is not only contingent
upon both the logical and physical condition of the
drive, but the methodology utilized as well. It would be
problematic at best to say, with any degree of certainty,
that all information can be eradicated.
According to Microsoft’s Online Xbox 360 Support
tutorials, once the Xbox console is reformatted, “…all
of the information saved on that device is erased and
cannot be recovered (Microsoft , 2012).” However, this
is rather misleading.
Image 3 – All of the IP and MAC addresses of the
players in the room appear (bottom window). To kick a
player off, right-click and delete from list. 1
Repeatedly Kicking a player out of a game room
primes the victim so he can be easily manipulated by
the hacker. Either by posing as a Microsoft employee
who can assist in “fixing” the connection problem or as
a helpful gamer who just happens to be computer
savvy, the target may naively provide personal
information or even permit the “good Samaritan”
access to his system to fix what he might believe is a
technical problem. Although an adult might not fall
prey to these types of ruses as easily, an adolescent,
who does not have the same reasoning abilities as an
adult, or may fear he has done something to his system,
may be easily swayed (Monisha Pasupathi, Vol 37,
May 2001).
6.0 Identity Theft and Used Consoles
With the continual emergence of new gaming
bundles and sleeker systems, more users will be selling
or trading their current consoles either because they are
outmoded or to financially offset the cost of acquiring
a newer system. In addition to selling the system in its
entirety, some users may elect to sell or swap the hard
drive independent of the console. Oftentimes, after
acquiring numerous games, storing countless media
files, or amassing a plethora of other data, the user may
seek to change a drive out of necessity because a larger
drive is required.
A quick look on eBay provides a small snapshot of
how many systems are sold daily. As of the date of this
report, there were over 3,705 Xbox 360 gaming
systems for sale in the United States alone (eBay,
2012). These listings are subject to change by the
minute and do not include Xbox hard drives being sold
without a console.. It is relevant to note, that when
7.0 Preparing Hard Drive for Examination
Researchers took a new Xbox 360 Elite containing a
Hitachi 120 GB hard drive and created two Xbox Live
gamertags. This was in addition to the automatically
assigned gamertag Microsoft provides new users (i.e.:
Player1). Two of these user profiles, including the one
automatically assigned, were deleted. The third
remained intact. Each of the two profiles created were
used for a brief period of time to play games and
access Xbox Live services. All the deleted gamertags
were
removed
following
Microsoft’s
recommendations:
1
No players were disconnected from the game room during this
demonstration.
1.
3242
3240
Go to Settings, select System.
2.
3.
4.
5.
6.
7.
Using Modio, the hard drive was then opened to see
if either of the deleted user names could be recovered.
Modio can be extremely handy for viewing image files
on the fly without needing to export them first using
another program. Because hardware write blocking is
necessary when utilizing Modio as data can be
overwritten
with
software
write
blocking,
Thermaltake’s BlackX docking station with hard write
blocking capabilities was employed.
Upon opening the drive, three players were noted.
The two deleted accounts, which were represented by
strings of zeros (Image 4) were discovered. The third
gamertag, HakinLuger was present, complete with the
user’s avatar. A preliminary examination of player
HakinLuger’s downloads reveals games (Kinect
Adventures, Halo, and Call of Duty) as well as the
services he utilized through Xbox Live such as Netflix
and Hulu Plus (Image 5).
Select Storage.
Select All Devices.
Select Gamer Profiles.
Select the gamertag that you want to delete.
Select Delete.
Select Delete Profile and Items (this option
deletes the profile and all saved games and
achievements affiliated with that profile)
(Microsoft , 2012).
7.1 Imaging the Drive
The current standard for authenticating evidence is
to preserve the original hard drive by imaging, or
creating a bit-by-bit copy of the drive to work from
(Nelson, 2008). This ensures that the original evidence
has not been accidently altered or tampered with.
However, when working with the Xbox 360 drive, this
can be rather challenging.
Some of the complications encountered when trying
to image an Xbox 360 drive can be attributed to the
drive’s FATX file format as well as the unknown or
proprietary structure of the drive. The hard drive was
imaged with DrDD, FTK Imager, and in Linux. All
three utilities yielded illegible sectors. Thus, in order to
view the the hard drive, researchers utilized gamer
modification tools. By employing modification utilities
the HD could be opened directly and files of interest
extracted and examined in a hex editor.
7.2 Hash Checksums
In light of the difficulty in obtaining a forensically
sound image of the drive to work from, repeated MD5
and SHA-1 checksums were performed to ensure the
integrity of the study drive. Using both FTK Imager
and Linux, checksums were continually recorded.
While this is not atypical in an examination to ensure
the validity of any evidence discovered, it was also
necessary in this case to monitor the dependability of
non-forensic tools utilized as well.
Image 4– Accounts either active or deleted on the hard
drive
8.0 The Investigation
While there were several groups of nulls, the drive
did not exhibit signs of being overwritten as there were
no large sections of zeros in non-program specific files.
It is always problematic at best however to
declaratively state that an Xbox drive has not been
reformatted without further studies as each operating
system has its own unique way of performing this
process and while the Xbox does share some
similarities with a PC, it cannot truly be measured
using the same criteria (Computer Gyaan, 2010).
3243
3241
David Collins, a computer scientist at Sam Hoston
State University in Texas and distributed by Protowise
Labs (Protowise Labs, 2011). XFT 2.0 features both
FATX and XTAF (derived from MS-DOS) file system
recognition, file hashing, displays deleted files (but
does not recover them), and file type identification. It
is designed to run on Windows operating systems and
features a user-friendly interface, although when tested
on both Windows XP and WIN 7, the utility did not
run as smoothly on the later (Dr. Ashley Podhradsky,
2011). In order to examine the drive with XFT 2.0, the
HD first had to be imaged with DrDD. Unfortunately,
although XFT recognizes the FATX file structure, the
host machine running Windows does not.
Utilizing XFT, the second gamertag, which was
created, used, and then deleted, was revealed (POD H
RAD SKY). Because XFT does not recover deleted
files, researchers were unable to obtain detailed data
about the gamertag by examining the drive. However,
the user’s profile was available at XboxGamerTag.com
(Image 7). The second deleted gamertag which was
automatically created by Microsoft was never
recovered. This might be due to the fact that it was
never utilized.
Image5- HakinLuger’s Downloads
A
quick
search
for
HakinLuger
at
XboxGamerTag.com (Xbox Gamertag, 2012) confirms
the games found on the drive and reveals that our
gamer had a preference for sports games (Image 6).
Xbox GamerTag is a free gaming search engine that
enables visitors to obtain anyone’s profile, including,
but not limited to, recent games played, achievements,
game scores, and avatar (Xbox Gamertag, 2012).
From an investigative purpose, because the site
provides the date and time a game was last played, it
could be used in collaboration with other data when
trying to place, or eliminate, a suspect in the same
game room with the victim. From a social engineering
perspective, these types of databases provide a
multiplicity of data to exploit making their job easier.
Image 7– Player POD H RAD SKY’s profile at
XboxGamerTag.com
While examining the hard drive with XFT 2.0,
another deleted gamertag was found (Reaver95) which
researchers did not create (Image 8). Reaver95 was a
guest who logged on to our Xbox using his own
gamertag to play. With nothing more than his
gamertag, researchers performed an internet search and
within twenty minutes a remarkable amount of
personally identifiable information was ascertained on
Reaver95’s (Image 9) including:
9 Favorite Xbox 360 game, scores, and last
logon date (Microsoft , 2012)
9 Location (Microsoft , 2012)
Image 6– HakinLuger game plays and scores at
XboxGamerTag.com
Although some of the games played by our first
deleted player were noted upon initial examination of
the drive, researchers had to employ XFT 2.0 Game
Console Forensics Toolkit. XFT 2.0 was developed by
3244
3242
9
9
9
9
9
9
Real Name (Microsoft , 2012)
College and collegiate activities(DSU,
2005)(Dakota State University , 2012)
(NDSU, 2007)
Ebay activities (items sold and purchased)
(Ebay, 2012)
Wife’s name(Washington High School,
2011)
Child (name and age) (Zach Jones, 2006)
Photographs (Zach Jones, 2006) (DSU,
2005)[
Image 9– Reaver95’s profile showing his last name,
location, and date he last logged on to Xbox Live
(Microsoft , 2012)
What is so alarming about this is that there was no
need to hack an account or employ social engineering
techniques to amass this information. With as little as a
gamertag, enough PII was gathered to either steal
Reaver95’s
identity,
perform
an
extremely
sophisticated social engineering attack, or to sell his
identity on the black market (Ferro, 2012).
Another gamertag found on the hard drive was
BryanOban1701 (Image 10). This player was not on
our gamer’s buddy-list or in a cache file which would
indicate that he was playing in the same game room
with HakinLuger, but was located in a Dashboard file.
An Internet search of gamertag BryanOban1701
revealed that he and HakinLuger shared a mutual
buddy on Xbox Live named Maliki67 (Image 11)
(Xbox Live Score , 2012). This finding suggests that
parallel to Facebook, Linked-in, and other social
networking sites, Microsoft connects users who share
something in common with one another.
Image 8– Deleted guest user, Reaver95, viewed in XFT
2.0
Image 10– gamertag BryanOban1701
3245
3243
adult permits anyone to access the player’s game
history, online status, and friend’s list (Microsoft ,
2012).
Xbox Live subscribers should not use the same
username or email address for their Xbox Live
accounts as they do for other membership based
accounts. Creating separate Hotmail and Messenger
accounts exclusively for Xbox Live may deflect
reconnaissance activity. Because PayPal is linked to
the user’s bank account and credit card, using PayPal
should be avoided. Although Microsoft details how to
change default settings to protect player privacy on
their website, it appears to be geared more toward
protecting minors (Microsoft , 2012). Finally, to deter
hackers from listening in on conversations users should
set up private game rooms (referred to as parties) and
utilize the privacy settings on their headsets.
Image 11- BryanOban1701 and HakinLuger on
Maliki67’s profile
9.0 Requested: Safeguarding PII
As society continues to have a greater dependency
on non-traditional computing devices, including virtual
worlds and social networking, there are new risks
introduced. Social networking and virtual world have
become a popular medium for both communication and
hackers who want to employ social engineering tactics.
By employing social engineering schemes, criminal
activities are more successful because it affords higher
rates of success and considerably lower chances of
getting caught and prosecuted.
One way users can protect themselves is by using
prepaid Xbox Live membership cards as opposed to
using credit cards or PayPal. Unfortunately, accounts
that do not enter a credit or debit card are unable to
utilize Microsoft’s 2 year Xbox Live Gold subscription
as pre-paid cards and PayPal are not accepted forms of
payment (Microsoft , 2012). A 2-year Xbox Live Gold
subscription enables Xbox Live users to rent movies
through Netflix, chat, watch shows with Hulu Plus, and
participate in multiplayer gaming at substantial
discount (Microsoft , 2012).
Like their counterpart in Virtual World, Microsoft’s
Xbox points can be traded-in by users to enhance their
gaming experiences. On Xbox, points can be used to
rent movies, download game extras such as maps,
levels, vehicles, and purchase avatar accessories, In
lieu of purchasing Microsoft points through the
console using a credit card, a safer alternative is for
users to purchase a Microsoft points cards from their
local video store.
As with any technology, users should always check,
and if necessary, change, their device’s default
settings. Interestingly, Xbox Live safety and privacy
default settings are automatically set according to the
birthdate entered by the user when setting up his
account (Microsoft , 2012). The default settings for an
10. 0 Future Work
In May of 2012 Microsoft announced that it was
testing a version of Internet Explorer with the goal of
integrating the browser directly into the Xbox
platform. (Murph, 2012). While many gamers view
the additional applications and functionality as a
benefit, there may be a potential downside. GFI
recently published a list of the most vulnerable
applications. (Florian, 2012). The list was compiled
by reviewing the 3532 vulnerabilities reported to the
National Vulnerability Database (NVD) in 2011.
Internet Explorer was number 11 in the list of “the
most targeted applications in 2011”. The NVD utilizes
the Common Vulnerability Scoring System version 2
(CVSS) to label vulnerabilities on a Low, Medium, or
High scale. Scores range from 0-10. Vulnerabilities
scoring between a 7.0 and 10.0 are labeled as “High”.
Of the 45 Internet Explorer vulnerabilities reported to
the NVD, 31 were designated as “High” (Florian,
2012). The continual expansion of Xbox platform and
inclusion of applications like Internet Explorer are sure
bring additional security concerns.
11.0 References
Swatting Hacker Uses Xbox to Trick Police. (2012, 3
7). Retrieved 6 1, 2012, from Acttion News:
http://abclocal.go.com/wpvi/story?section=ne
ws/crime&id=8571101
Acquisti, R. G. (2005). Information Revelation and
Privacy in Online Social Networks (The
Facebook case). ACM Workshop on Privacy
3246
3244
from Digital Trends:
http://www.digitaltrends.com/gaming/hackerhijacks-xbox-360-sends-swat-team-to-home/
in the Electronic Society (WPES) (pp. 71 - 80
). Alexandria: ACM.
Allen, J. (2012, 2 13). Call Of Duty Game Leads To
Prank Lewisville 911 Call. Retrieved 6 1,
2012, from CBS News:
http://dfw.cbslocal.com/2012/02/13/call-ofduty-game-leads-to-prank-lewisville-911-call/
Craigslist . (2012). Craigslist U.S. . Retrieved 5 23,
2012, from Craigslist Online Community:
http://www.craigslist.org/about/sites#US
Crawley, D. (2011, 12 4). How I was hacked.
Retrieved 5 24, 2012, from
http://venturebeat.com/2011/12/04/how-iwas-hacked-a-tale-of-hijack-xbox-live-andfifa-trading-cards/
Ashley Podhradsky, R. D. (2011). Identity Theft and
Used Gaming Consoles: Recovering Personal
Information from Xbox 360 Hard Drives.
AMCIS 2011 Proceedings. Detriot.
Dakota State University . (2012). Trojan Football
Individual Records. Retrieved 6 7, 2012
AT&T. (2012). Standard TTY. Retrieved 6 1, 2012,
from AT&T Relay Services:
http://relayservices.att.com/content/2/im_rela
y_3.html
DataRescue. (2012). DrDD - DataRescue's DD
freeware. Retrieved 5 1, 2012, from
DataRescue:
http://www.datarescue.com/photorescue/v3/dr
dd.htm
Baker, J. A. (2006). Xbox 360 System Architecture.
IEEE Micro, 27-35. Retrieved from Microsoft
.
David Becker . (2001, 1 6). Microsoft got game: Xbox
unveiled. Retrieved 5 4, 2012, from CNET
News: http://news.cnet.com/Microsoft-gotgame-Xbox-unveiled/2100-1040_3250632.html?tag=untagged
BBC. (2009, 2 20). Hackers target Xbox Live players .
Retrieved 5 22, 2012, from BBC News:
http://news.bbc.co.uk/2/hi/technology/788836
9.stm
CAI Networks. (2000). Strict, Moderate, and Open
NAT - Load balancing Xbox Game Servers .
Retrieved 5 4, 2012, from CAI Networks:
http://www.cainetworks.com/support/how-toNAT-strict-open.html
Digiex. (2011, 11 14). Party Buffalo Drive Explorer
2.0.0.9 Download Xbox 360 FATX Hard
Drive & USB Explorer. Retrieved 5 4, 2012,
from Digiex.com:
http://digiex.net/downloads/download-center2-0/xbox-360-content/apps/7328-partybuffalo-drive-explorer-2-0-0-9-downloadxbox-360-fatx-hard-drive-usb-explorer.html
Charles E. Lively, J. (2003, 12). Psychological Based
Social Engineering. Retrieved 5 22, 2012,
from SANS:
http://www.giac.org/paper/gsec/3547/psychol
ogical-based-social-engineering/105780
Dr. Ashley Podhradsky, D. R. (2011). A Practitioners
Guide to the Forensic Investigation of Xbox
360 Gaming Consoles. The 2011 Conference
on Digital Forensics, Security, and Law
(ADFSL). Richmond: ADFSL.
Computer Gyaan. (2010, 11 2). Disk formatting and
Data recovery. Retrieved 5 3, 2012, from
Computer Gyaan:
http://www.muamat.com/classifieds/174/even
ts/2010-1230/11663_Disk_formatting_and_Data_recove
ry.html
DSU. (2005). DSU Academic, leadership and Athletics
Honors in 2005. Retrieved 5 5, 2012, from
Dakota State University :
http://www.departments.dsu.edu/student_servi
ces/honors/2005/default.htm
Couts, A. (2011, 7 1). Hacker hijacks Xbox 360, sends
SWAT team to home. Retrieved 6 1, 2012,
3247
3245
Microsoft . (2011, 9 30). Managing my Xbox LIVE
account. Retrieved 5 29, 2012, from Xbox
Forums :
http://forums.xbox.com/xbox_forums/xbox_s
upport/f/12/t/97215.aspx?PageIndex=3
Ebay. (2012). eBay My World: reaver95. Retrieved 5
16, 2012, from Ebay:
http://myworld.ebay.com/reaver95
eBay. (2012, 6 7). Xbox 360 Consoles . Retrieved 6 7,
2012, from eBay U.S. :
http://www.ebay.com/sch/Systems/139971/i.html?_nkw=xbox+360
Microsoft . (2011, 12). Xbox LIVE Terms of Use.
Retrieved 5 22, 2012, from Microsoft :
http://www.xbox.com/en-US/legal/livetou
FCC. (2012). Caller ID and Spoofing. Retrieved 6 1,
2012, from Federal Communications
Commission:
http://www.fcc.gov/guides/caller-id-andspoofing
Microsoft . (2012). Article ID: 906502 - How to format
an Xbox 360 Hard Drive or Memory Unit.
Retrieved 6 1, 2012, from
http://support.microsoft.com/kb/906502
Microsoft . (2012). Download, move, or delete your
Xbox LIVE profile. Retrieved 5 30, 2012,
from Xbox Live: http://support.xbox.com/enUS/xbox-360/settings-and-initialsetup/profile-move-delete
Ferro, M. (2012, 1 8). Thousands of hacked Xbox Live
accounts up for sale on black market.
Retrieved 6 6, 2012, from Gamer.Blorge:
http://gamer.blorge.com/2012/01/08/thousand
s-of-hacked-xbox-live-accounts-up-for-saleon-black-market/
Game Tuts. (2012). Modio Download. Retrieved 5 5,
2012, from Game Tuts: http://www.gametuts.com/community/modio.php
Microsoft . (2012). Manage your Xbox LIVE payment
options. Retrieved from Xbox:
http://support.xbox.com/en-US/billing-andsubscriptions/manage-payment-options/addedit-xbox-live-payment-option
Goodin, D. (6, 30 2011). Xboxer SWATTED by armed
cops after online spat. Retrieved 6 6, 2012,
from The Register:
http://www.theregister.co.uk/2011/06/30/xbox
_swat_police_rait/
Microsoft . (2012). Reaver95's Profile. Retrieved 6 1,
2012, from Xbox: http://live.xbox.com/enUS/Profile?GamerTag=Reaver95
Microsoft . (2012). Xbox Live Membership Overview.
Retrieved from Xbox:
http://www.xbox.com/enUS/live/join?xr=shellnav
Heeringa, C. (2011, 9 11). 911 hoax in Sammamish
leads to major police response. Retrieved 5
22, 2012, from Sammamish Review:
http://sammamishreview.com/2011/09/08/911
-hoax-in-sammamish-leads-to-major-policeresponse
Microsoft . (2012). Xbox LIVE online safety and
privacy. Retrieved from Xbox Live:
http://support.xbox.com/en-US/xboxlive/online-privacy-and-safety/onlinesafety#ec4193e4c26143f18e1960c08f2ed876
Kevin D. Mitnick, W. L. (2002). The Art of Deception:
Controlling the Human Element of Security.
Indianapolis : Wiley.
Microsoft. (2012). Store your saved games in the
cloud. Retrieved 5 22, 2012, from
http://support.xbox.com/en-US/xboxlive/game-saves-in-the-cloud/cloud-savegames
Meer, A. (2008, 9 11). 10 Xbox 360 tricks Microsoft
won't tell you. Retrieved 5 22, 2012, from
Techradar:
http://www.techradar.com/news/gaming/cons
oles/10-xbox-360-tricks-microsoft-wont-tellyou-464200
Monisha Pasupathi, U. M. (Vol 37, May 2001). Seeds
of wisdom: Adolescents' knowledge and
3248
3246
Protowise Labs. (2011). XFT 2.0 Game Console
Forensics is Released. Retrieved 5 22, 2012,
from XFT 2.0 Game Console:
http://protowise.com/?tag=xft-xbox-forensics
judgment about difficult life problems.
Developmental Psychology, 351-361.
Mosin Hasan, N. P. (Vol.2, No.2, June 2010). Case
Study on Social Engineering Techniques for
Persuasion . International Journal on
Applications of Graph Theory in Wireless ad
hoc Networks and Sensor Networks, 17-23.
Rubin, B. P. (2012, 1 9). Xbox Hacks Continue: Gamer
Exposes Microsofts Fraud Prevention
Problems. Retrieved 5 23, 2012, from Inside
Daily Gaming :
http://www.insidegamingdaily.com/2012/01/0
9/xbox-hacks-continue-gamer-exposesmicrosofts-fraud-prevention-problems/
NDSU. (2007, 9 25). Wrestling Bio. (Gobison.com)
Retrieved 6 1, 2012, from North Dakota State
:
http://www.gobison.com/ViewArticle.dbml?D
B_OEM_ID=2400&ATCLID=659643
Siciliano, R. (2010, 7 16). What is “Swatting” And
How Do I Protect My Family. Retrieved 6 1,
2012, from Infosec:
http://news.cnet.com/8301-17852_357377796-71/xbox-360-threat-leads-to-swatteam-raid/
Nelson, B. (2008). Guide to Computer Forensics and
Investigations, Third Edition. Boston :
Cengage Learning.
Nmap.org. (2012). Nmap . Retrieved 5 3, 2012, from
Nmap.org: http://nmap.org/
Taylor, K. (2012). Hacked on Xbox. Retrieved 5 29,
2012, from Hacked on Xbox:
http://www.hackedonxbox.com/
OXID. (2012). Cain and Abel Passowrd Recovery
Tool. Retrieved 6 1, 2012, from OXID.com:
http://www.oxid.it/cain.html
Todd Bishop. (2012, 2 3). Xbox 360 tops Wii and PS3
for 1st time in yearly global sales. Retrieved 5
28, 2012, from Geek Wire:
http://www.geekwire.com/2012/xbox-360tops-wii-ps3-1st-time-yearly-global-sales/
PEW Internet Project. (2008, 12 9). Nearly All US
Teens, 53% of Adults Play Video Games.
Retrieved 5 22, 2012, from PEW Research
Center:
http://www.marketingcharts.com/interactive/n
early-all-us-teens-53-of-adults-play-videogames-7114/
Washington High School. (2011, 4 17). Classmate
Updates. Retrieved 6 6, 2012, from
Washington High School Class of 2001:
https://sites.google.com/site/whsclassof01/cla
ssmateupdates
Plunkett, L. (2012, 5 25). Report: How Scammers Are
Stealing Xbox Live Accounts, and the Few
Things You Can Do to Protect Yourself.
Retrieved 5 29, 2012, from Kotaku:
http://kotaku.com/5913228/report-howscammers-are-stealing-xbox-live-accountsand-what-they-do-with-them/
Xbox Gamertag. (2012). Search Xbox Live Gamertags.
(Xbox Community Developer Program
(XCDP)) Retrieved 5 23, 2012, from Xbox
Gamertag: http://www.xboxgamertag.com/
Xbox Live Score . (2012). Maliki67. Retrieved 6 5,
2012, from Xbox Live Score :
http://www.xboxlivescore.com/profile/Maliki
67
Podhradsky, D. A. (2011). Data sanitization policy:
How to ensure thorough data scrubbing.
Retrieved 6 6, 2012, from
SearchSecurity.com:
http://searchsecurity.techtarget.com/tip/0,2894
83,sid14_gci1526403,00.html
Zach Jones. (2006). DSU Freshman Year. Retrieved 5
5, 2012, from ZachJones.com:
3249
3247
http://www.zachjones.com/Picutesoffolks/DS
UFreshmanYear.html
Murph, Darren. (2012) Internet Explorer Coming to
Xbox 360 this year, Kinect/Voice Integration
and All. Retrieved 8 30, 2012, from
http://www.engadget.com/2012/06/04/internet
-explorer-coming-to-xbox-360-kinectintegration-and-all/
Florian, Cristian (2012). The Most Vulnerable
Operating Systems and Applications in 2011.
Retrieved 8 30, 2012, from
http://www.gfi.com/blog/the-most-vulnerableoperating-systems-and-applications-in-2011/
3250
3248