PDA

View Full Version : KESS and K-TAG lpc2478 UNLOCK CRP3



mariusica_boy
15th November, 2015, 07:41 PM
A method of disabling the protection CRP3 microcontroller LPC2478.
This method does not allow the reading of locked memory microcontroller.
protection was eliminated in 16 minutes.

I found on internet
https://www.youtube.com/watch?v=G2EteKs_haQ

EduardNN
15th November, 2015, 07:45 PM
It is a dubbed my post. (http://www.digital-kaos.co.uk/forums/showthread.php/497268-KESS2-K-TAG-lpc2478-UNLOCK?p=2643386#post2643386)
And I did not notice that the author of this post, I did not :)

Johnner
15th November, 2015, 07:55 PM
Mate,someone has already posted this here earlier on today !

EduardNN
15th November, 2015, 08:23 PM
Strange, but I'm the author of this method .... (http://www.digital-kaos.co.uk/forums/showthread.php/497268-KESS2-K-TAG-lpc2478-UNLOCK?highlight=kess2)

Andrei2015
15th November, 2015, 08:37 PM
Strange, but I'm the author of this method .... (http://www.digital-kaos.co.uk/forums/showthread.php/497268-KESS2-K-TAG-lpc2478-UNLOCK?highlight=kess2)


Good job Eduard

mihaiservice
15th November, 2015, 08:56 PM
Strange, but I'm the author of this method .... (http://www.digital-kaos.co.uk/forums/showthread.php/497268-KESS2-K-TAG-lpc2478-UNLOCK?highlight=kess2)

Yes,you are the author....but someone will take some money !
Great job also gospodine !


Regards !

pinotec
15th November, 2015, 09:18 PM
good work
is possible have instruction for kt*g ?

EduardNN
15th November, 2015, 09:54 PM
I do not have K-TAG, but I think everything will turn to him.

Youneselm
16th November, 2015, 09:54 AM
Tampering Techniques

We can distinguish four major attack categories:

A. Microprobing techniques can be used to access the chip surface directly, thus we can observe, manipulate, and interfere with the integrated circuit.

1) Software attacks use the normal communication interface of the processor and exploit security vulnerabilities found in the protocols, cryptographic algorithms, or their implementation.

2) Eavesdropping techniques monitor, with high time resolution, the analog characteristics of all supply and interface connections and any other electromagnetic radiation produced by the processor during normal operation.

3) Fault generation techniques use abnormal environmental conditions (such as heat and power glitches) to generate malfunctions
in the processor that provide additional access.

All microprobing techniques are invasive attacks. They require hours or weeks in a specialized laboratory and in the process i decap the packaging. The other three are non-invasive attacks. After we have prepared such an attack for a specific processor type and software version, i can usually reproduce it within seconds on another mcu.

Look to my tread about Morgan 2014 dash mcu.

this is my setup for playing with mcu's;-)
http://images.tapatalk-cdn.com/15/11/16/c04b616b79e3c15d87d038d208e727bb.jpg
http://images.tapatalk-cdn.com/15/11/16/f68af04b28c6ca17a294b0ba60125ba5.jpg

This one is for sale if you know someone in youre family, let me know.
I'am glad that here are Some good engineers. To talk about good solutions.
Whitout Chinees boys looking over our sholders;-)

moky
16th November, 2015, 02:05 PM
EduardNN

could you send us pinout please?

thanks!

EduardNN
16th November, 2015, 04:10 PM
EduardNN

could you send us pinout please?

thanks! See foto (http://www.digital-kaos.co.uk/forums/showthread.php/497268-KESS2-K-TAG-lpc2478-UNLOCK?p=2643386&viewfull=1#post2643386)

moky
16th November, 2015, 05:01 PM
sorry I didn't saw photo......!!! all ok now

thanks