Let me introduce you to the most fabricated, non-intellectual human being in this community: Christian (Hazz) from LiveEmulation (or his other failed attempts: Dominate; Vulcan; XOS).
To start off lightly, Christian has no perception of what he's doing when it comes to the xbox code challenge. From using BLiNDzZ's API but claiming to have made his own, to faking function definitions and claiming to have done some 1337 shit to developers who have knowledge on the subject, let me tell you all the true side to this clown. The only insight Christian has to lasting is what he's told by unknown sources, I know for a fact that he's spoon-fed everything he claims to have figured out himself. For starters, he claims to have made his client source from scratch, yet with small digging around, I find that his client source is actually a teapot source, previously named "Insanity" - https://i.imgur.com/EwnheiK.png. Another prime example is Christian claiming to understand how the hypervisor is encrypted. For anyone that doesn't know, if you figure out how to encrypt the hypervisor you can last without having to reuse dumped data. Christian was memed by Ronin for reusing data, so he decided to fake knowing how to do it but inevitably got clowned on in return. As I said before, Christian only knows what he's been told, he doesn't actually figure anything out himself, so it was no surprise that he came to said developer with public information which was incorrect. Below you can find a few of the chat messages relating to Christian lying about knowing how this works, if anyone reading this knows about how this works you'll know that his key order is incorrect.
https://i.imgur.com/IHWZNEf.png https://i.imgur.com/6zTeA8d.png https://i.imgur.com/hen9UBH.png
Now, you may be thinking "surely he knows something if he knows about the keys", well no. The next screenshot is some code he showed me which is completely wrong. Let me explain.. First, as you already know, he had the wrong key order. This is already a sign of bullshit. In the below screenshot you'll see a few key things which are out of place, mostly "0x80", "cbc", and "HVEnc.bin". These are out of place for a few reasons, firstly he's iterating every 0x80 bytes and running aes on them. Why is this wrong? Well, he knows 0x80 bytes has something to do with it, but he has no idea what, so he's just trying to show off. On this topic, 0x80 represents the block size of each 2 bytes of the cached hypervisor, because the cached hypervisor is actually a bunch of 2 byte check-sums of the encrypted hypervisor. The checksum method does not include aes. Second big mistake is he's using aes cbc, and anyone that knows about aes knows that this takes an initialization vector (iv). Unfortunately for Christian, the xbox doesn't use this to generate the encrypted hypervisor, it uses aes ecb as that doesn't require an iv. Below is also a screenshot of the tool he made which does nothing.
https://i.imgur.com/bO3WGDB.png https://i.imgur.com/FBdK8lN.png
Now let's get to LiveEmulation.. Christian released offline files recently which I do not recommend using. His released xex is the equivalent of XeNoN, meaning it runs the challenge the same way so if you don't want to be crashing every 10 minutes, stay away. You may be thinking "why hasn't he just posted LiveEmulation for this dash?" I'm 99% certain he doesn't last this dash, hence why he hasn't released the xex in months. He's kept the "updated" xex to himself and two other staff members, which didn't receive the xex until recent. He claims they've been unbanned for weeks, yet I have reports from one of them that they got kv banned within a day of using the recent xex. I also got banned within a day. Overall, LiveEmulation has gone to shit because Christian is fake and has no idea what he's doing.
If you think the teapot dig is fake, the release of the source codes is on the very GitHub Christian was "working on" with me. Below you'll see actual credits for the code in his sources, unlike the terrible credits he had in his "offline files" release.
The downloads:
Live Emulation Client: https://github.com/SexyExploits/LEClient
Live Emulation Server: https://github.com/SexyExploits/LEServer
Extras:
So we have recently found out that that Christian has tried selling Ronin's security to numerous people, so he has sent me the Live Emulation cheat source (his old projects the ones that were never released). You really shouldn't try and sell other people's work Christian. Here is the XeProtect tool aswell.
Cheat Source (Client + Server): http://www.mediafire.com/file/ho2681dx8f...3.rar/file
XeProtect: http://www.mediafire.com/file/5ixp8dvmd1...t.rar/file
Virus Scans:
https://www.virustotal.com/gui/file/8b40.../detection
https://www.virustotal.com/gui/file/e9b0.../detection
Real Credits:
XBLS - Using a lot of functions
Infernus - LiveBlock
Teapot - Used as a base
BLiNDzZ - API source
Jay - All of the UI
Alex - Client Panel/KV Guard
Ronin - All of the security
Special thanks to Ronin for explaining certain things about the hypervisor.
To start off lightly, Christian has no perception of what he's doing when it comes to the xbox code challenge. From using BLiNDzZ's API but claiming to have made his own, to faking function definitions and claiming to have done some 1337 shit to developers who have knowledge on the subject, let me tell you all the true side to this clown. The only insight Christian has to lasting is what he's told by unknown sources, I know for a fact that he's spoon-fed everything he claims to have figured out himself. For starters, he claims to have made his client source from scratch, yet with small digging around, I find that his client source is actually a teapot source, previously named "Insanity" - https://i.imgur.com/EwnheiK.png. Another prime example is Christian claiming to understand how the hypervisor is encrypted. For anyone that doesn't know, if you figure out how to encrypt the hypervisor you can last without having to reuse dumped data. Christian was memed by Ronin for reusing data, so he decided to fake knowing how to do it but inevitably got clowned on in return. As I said before, Christian only knows what he's been told, he doesn't actually figure anything out himself, so it was no surprise that he came to said developer with public information which was incorrect. Below you can find a few of the chat messages relating to Christian lying about knowing how this works, if anyone reading this knows about how this works you'll know that his key order is incorrect.
https://i.imgur.com/IHWZNEf.png https://i.imgur.com/6zTeA8d.png https://i.imgur.com/hen9UBH.png
Now, you may be thinking "surely he knows something if he knows about the keys", well no. The next screenshot is some code he showed me which is completely wrong. Let me explain.. First, as you already know, he had the wrong key order. This is already a sign of bullshit. In the below screenshot you'll see a few key things which are out of place, mostly "0x80", "cbc", and "HVEnc.bin". These are out of place for a few reasons, firstly he's iterating every 0x80 bytes and running aes on them. Why is this wrong? Well, he knows 0x80 bytes has something to do with it, but he has no idea what, so he's just trying to show off. On this topic, 0x80 represents the block size of each 2 bytes of the cached hypervisor, because the cached hypervisor is actually a bunch of 2 byte check-sums of the encrypted hypervisor. The checksum method does not include aes. Second big mistake is he's using aes cbc, and anyone that knows about aes knows that this takes an initialization vector (iv). Unfortunately for Christian, the xbox doesn't use this to generate the encrypted hypervisor, it uses aes ecb as that doesn't require an iv. Below is also a screenshot of the tool he made which does nothing.
https://i.imgur.com/bO3WGDB.png https://i.imgur.com/FBdK8lN.png
Now let's get to LiveEmulation.. Christian released offline files recently which I do not recommend using. His released xex is the equivalent of XeNoN, meaning it runs the challenge the same way so if you don't want to be crashing every 10 minutes, stay away. You may be thinking "why hasn't he just posted LiveEmulation for this dash?" I'm 99% certain he doesn't last this dash, hence why he hasn't released the xex in months. He's kept the "updated" xex to himself and two other staff members, which didn't receive the xex until recent. He claims they've been unbanned for weeks, yet I have reports from one of them that they got kv banned within a day of using the recent xex. I also got banned within a day. Overall, LiveEmulation has gone to shit because Christian is fake and has no idea what he's doing.
If you think the teapot dig is fake, the release of the source codes is on the very GitHub Christian was "working on" with me. Below you'll see actual credits for the code in his sources, unlike the terrible credits he had in his "offline files" release.
The downloads:
Live Emulation Client: https://github.com/SexyExploits/LEClient
Live Emulation Server: https://github.com/SexyExploits/LEServer
Extras:
So we have recently found out that that Christian has tried selling Ronin's security to numerous people, so he has sent me the Live Emulation cheat source (his old projects the ones that were never released). You really shouldn't try and sell other people's work Christian. Here is the XeProtect tool aswell.
Cheat Source (Client + Server): http://www.mediafire.com/file/ho2681dx8f...3.rar/file
XeProtect: http://www.mediafire.com/file/5ixp8dvmd1...t.rar/file
Virus Scans:
https://www.virustotal.com/gui/file/8b40.../detection
https://www.virustotal.com/gui/file/e9b0.../detection
Real Credits:
XBLS - Using a lot of functions
Infernus - LiveBlock
Teapot - Used as a base
BLiNDzZ - API source
Jay - All of the UI
Alex - Client Panel/KV Guard
Ronin - All of the security
Special thanks to Ronin for explaining certain things about the hypervisor.
~ Alex ~