Hacking the PIC 18F1320

opened_state

 I came across this Article and thought the people here would find this an interesting read.

Andrew “Bunnie” Huang is well known for his Xbox hacks.

He wanted to try out some reversing techniques on programmed PIC 18F1320 chips he acquired in order to read the secured FLASH memory.

After having the PICs commercially decapped, he analyzed the silicon under an electron microscope revealing the location of security bits relative to the FLASH memory he sought to read. In this tutorial he reveals the further tedious steps he took to complete hacking the PIC 18F1320 to read the memory data.

 

READ MORE:

Visit website http://www.bunniestudios.com/blog/?page_id=40


Posted: 7 years 2 months ago by MMcLaren #8396
MMcLaren's Avatar
Hi Gavin,

This showed up on Hack-a-day yesterday but I actually saw it several years ago when it showed up on the Microchip forum.

Regards, Mike

Forum Activity

Member Access