Hacking the PIC 18F1320

Posted on Monday, June 27th, 2011 in hacks, how-to, reversed by the machinegeek

Andrew “Bunnie” Huang is well known for his Xbox hacks. He wanted to try out some reversing techniques on programmed PIC 18F1320 chips he acquired in order to read the secured FLASH memory.

After having the PICs commercially decapped, he analyzed the silicon under an electron microscope revealing the location of security bits relative to the FLASH memory he sought to read. In this tutorial he reveals the further tedious steps he took to complete hacking the PIC 18F1320 to read the memory data.

Via J. Peterson in comments.

This entry was posted on Monday, June 27th, 2011 at 3:02 pm and is filed under hacks, how-to, reversed. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.

2 Responses to “Hacking the PIC 18F1320”

  1. makomk says:

    Heh. Old page, but still a very clever hack. I seem to recall that recent AVR microcontrollers are designed so that exposing the lock fuses to UV enables code protection, as well as having metal shields protecting them; not sure about PICs.

  2. jone says:

    There is another great description of dumping flash and EEPROM from a protected PIC18F on

    The full write up is in the PDF paper

Leave a Reply

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Recent Comments

  • Louis Beaudoin: This is great work guys! Placing an order for a sample pack and hope to use the service to make a custom cable soon.
  • Parkview: Another great idea! Be handy to be able to purchase the corresponding SMD and TH sockets as well.
  • Ryan White: Second that. I'd love the option to extend this already awesome tool to RF cables, hoping it's already in the works because I know the...
  • Tom Keddie: Hi Ian, Congrats on the launch. Suggest you name all the CHRO connectors you have as female. It's not done often but you can insert...
  • Craig Hollabaugh: Excellent post! Thanks