Decrypt using soft decryption technology. stc MCU encryption is mainly to realize the user code encryption and then download, in order to prevent the third-party serial port monitoring software in the process of code download the user's source code data interception, so as to ensure the safety of the code. Soft decryption is to find the design defects of microcontroller through software, read out the internal OTP/FLASHROM or EEPROM code, and realize chip cracking.
It is difficult to take their own software crack is also difficult, and now the ultimate crack method is to melt the plastic sealing module with solvent, directly connect the ROM module and then readTake.
microcontroller decryption, there are mainly the following methods to crack the early Atmel Flash film has a bug, that is, when the chip is erased, it will first erase the protection bit and then erase the content. So the cracking method comes, when erasing, accurate timing, midway power off, so the protection is removed, the content can be read.
1, probe technology The technology is to directly expose the internal connection of the chip, and then observe, control, interfere with the MCU to achieve the attack purposeYes. The first step in an invasive attack is to unpack the chip (referred to as "opening" sometimes called "opening", English "DECAP", decapsulation).
2, the first method needs to bind the chip to the test fixture, with the help of the binding table to operate. In addition to the attacker's knowledge and necessary skills, the second method also requires personal wisdom and patience, but it is relatively convenient to operate and completely operated in the family. The plastic on the chip can be peeled off with a knife, and the epoxy around the chip can be decomposed with concentrated nitric acidCorrode.
3, MCU decryption, there are mainly the following methods to crack the early Atmel Flash film has a bug, that is, when the chip is erased, it will first erase the protection bit and then erase the content. So the cracking method comes, when erasing, accurate timing, midway power off, so the protection is removed, the content can be read.
4, single-chip decryption is a very loaded thing, first of all, you need to oxidize the packaging surface of the chip, with professional equipment for decryption. The first is to dissolve the chip package completely, exposing the metal wiring. We need to tie the chipSet to the test fixture and operate with the help of the binding table. The second is to remove only the plastic packaging on top of the silicon core.
5, we put forward the following suggestions according to the decryption practice of Shanghai: (1) Before selecting the encryption chip, it is necessary to fully investigate and understand the new progress of chip decryption technology, including which single chip microcomputer has been confirmed to crack.
1, the first method needs to bind the chip to the test fixture, with the help of the binding table to operate. The second method requires, in addition to some knowledge of the attackerIn addition to knowledge and necessary skills, it also requires personal wisdom and patience, but it is relatively convenient to operate, and it is completely operated in the family. The plastic on the chip can be peeled off with a knife, and the epoxy around the chip can be corroded away with concentrated nitric acid.
2, the microcontroller, also called the chip, there are programs in it. The programs on the chip are encrypted and generally unreadable. But it can be cracked. Where there is encryption, there is decryption. If you want to decrypt the MCU in your hand, as long as you enter "chip decryption" in Baidu, you can find a company that specializes in modchip. But it must be noted that there are crooks in this industry, because decryption is requiredDeposit first, so there are more scammers.
3, the first is to completely dissolve the chip package and expose the metal wire. The chip needs to be attached to the test fixture and operated with the help of a binding table. The second is to remove only the plastic packaging on top of the silicon core. In addition to the need to have a certain amount of knowledge and necessary skills of the attacker, it also requires personal wisdom and patience, but the operation is relatively convenient and completely operated in the family.
4, power and clock transient jumps can affect the decoding and execution of a single instruction in some processors. (4) Probe technology The technology is directly exposed to the internal wiring of the chip, however