Hacking the PIC 18F1320

Posted on Monday, June 27th, 2011 in hacks, how-to, reversed by the machinegeek

Andrew “Bunnie” Huang is well known for his Xbox hacks. He wanted to try out some reversing techniques on programmed PIC 18F1320 chips he acquired in order to read the secured FLASH memory.

After having the PICs commercially decapped, he analyzed the silicon under an electron microscope revealing the location of security bits relative to the FLASH memory he sought to read. In this tutorial he reveals the further tedious steps he took to complete hacking the PIC 18F1320 to read the memory data.

Via J. Peterson in comments.

This entry was posted on Monday, June 27th, 2011 at 3:02 pm and is filed under hacks, how-to, reversed. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.

2 Responses to “Hacking the PIC 18F1320”

  1. makomk says:

    Heh. Old page, but still a very clever hack. I seem to recall that recent AVR microcontrollers are designed so that exposing the lock fuses to UV enables code protection, as well as having metal shields protecting them; not sure about PICs.

  2. jone says:

    There is another great description of dumping flash and EEPROM from a protected PIC18F on

    The full write up is in the PDF paper

Leave a Reply

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Recent Comments