Hacking the PIC 18F1320
Andrew “Bunnie” Huang is well known for his Xbox hacks. He wanted to try out some reversing techniques on programmed PIC 18F1320 chips he acquired in order to read the secured FLASH memory.
After having the PICs commercially decapped, he analyzed the silicon under an electron microscope revealing the location of security bits relative to the FLASH memory he sought to read. In this tutorial he reveals the further tedious steps he took to complete hacking the PIC 18F1320 to read the memory data.
Via J. Peterson in comments.This entry was posted in hacks, how-to, reversed and tagged PIC 18F1320, reverse engineering.