PLD: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 9: | Line 9: | ||
Example projects include: | Example projects include: | ||
* Arduino based: http://www.jammarcade.net/arduino-pal-cracker/ | * Arduino based: http://www.jammarcade.net/arduino-pal-cracker/ | ||
** The method used was identical to the way Charles MacDonald’s device worked so to keep compatibility with his analyser program. I don’t really require the ‘dumping’ feature of this as I use the hardware from Charles and its a lot faster to use but this option is there if I ever need it. | ** "The method used was identical to the way Charles MacDonald’s device worked so to keep compatibility with his analyser program. I don’t really require the ‘dumping’ feature of this as I use the hardware from Charles and its a lot faster to use but this option is there if I ever need it." | ||
* Charles MacDonald: was this published? | * Charles MacDonald: was this published? | ||
* brizzo may have something | * brizzo may have something | ||
* kevtris may have something | * kevtris may have something |
Latest revision as of 23:05, 5 September 2018
ATF22V10C
Brute force cracker
A common technique for recovering protected contents is iterating over all input permutations and observing output permutations. However, this only works well for PLDs with only combintorial logic (ie no FFs).
Example projects include:
- Arduino based: http://www.jammarcade.net/arduino-pal-cracker/
- "The method used was identical to the way Charles MacDonald’s device worked so to keep compatibility with his analyser program. I don’t really require the ‘dumping’ feature of this as I use the hardware from Charles and its a lot faster to use but this option is there if I ever need it."
- Charles MacDonald: was this published?
- brizzo may have something
- kevtris may have something