It is a dubbed my post.
And I did not notice that the author of this post, I did not
A method of disabling the protection CRP3 microcontroller LPC2478.
This method does not allow the reading of locked memory microcontroller.
protection was eliminated in 16 minutes.
I found on internet
https://www.youtube.com/watch?v=G2EteKs_haQ
Last edited by mariusica_boy; 15th November, 2015 at 07:48 PM.
It is a dubbed my post.
And I did not notice that the author of this post, I did not
Andrei2015 (15th November, 2015), artkiani (17th August, 2016), betoRJ (24th November, 2017), bmw320d (17th November, 2015), CLK1201 (16th November, 2015), jackeldestripador (14th September, 2016), mariusica_boy (15th November, 2015), mihaiservice (15th November, 2015), toms4 (15th November, 2015), twchnodictator (15th November, 2015)
Mate,someone has already posted this here earlier on today !
Aaahh ! I love the smell of Eeprom in the morning...
" We'll come in low out of the rising sun, and about a mile out, we'll put on the music . . . "
artkiani (17th August, 2016), busaman (15th November, 2015), Dobermann (16th November, 2015), dorofteius (15th November, 2015), Jean01 (17th November, 2015), Kayhan 17# (20th March, 2016), mdanilo (15th November, 2015), moky (16th November, 2015), morcegao (5th April, 2016), pinotec (15th November, 2015), plamen_n (11th March, 2017), teamtuner (16th November, 2015)
good work
is possible have instruction for kt*g ?
Tampering Techniques
We can distinguish four major attack categories:
A. Microprobing techniques can be used to access the chip surface directly, thus we can observe, manipulate, and interfere with the integrated circuit.
1) Software attacks use the normal communication interface of the processor and exploit security vulnerabilities found in the protocols, cryptographic algorithms, or their implementation.
2) Eavesdropping techniques monitor, with high time resolution, the analog characteristics of all supply and interface connections and any other electromagnetic radiation produced by the processor during normal operation.
3) Fault generation techniques use abnormal environmental conditions (such as heat and power glitches) to generate malfunctions
in the processor that provide additional access.
All microprobing techniques are invasive attacks. They require hours or weeks in a specialized laboratory and in the process i decap the packaging. The other three are non-invasive attacks. After we have prepared such an attack for a specific processor type and software version, i can usually reproduce it within seconds on another mcu.
Look to my tread about Morgan 2014 dash mcu.
this is my setup for playing with mcu's;-)
This one is for sale if you know someone in youre family, let me know.
I'am glad that here are Some good engineers. To talk about good solutions.
Whitout Chinees boys looking over our sholders;-)
Last edited by Youneselm; 10th December, 2015 at 02:55 PM.
bobolin4o (16th November, 2015), CustomCars (16th November, 2015), EduardNN (16th November, 2015), gazvts (16th November, 2015)
EduardNN
could you send us pinout please?
thanks!
See foto
sorry I didn't saw photo......!!! all ok now
thanks
Last edited by moky; 16th November, 2015 at 05:37 PM.
Bookmarks