Main > Main Forum
To 'romize' PCBs!
<< < (2/3) > >>
Smittydc:
look through the mame boards -- there are some guys on there you can send the boards to and they'll extract them (eventually).
Lilwolf:
These examples are the simplest cases.

Sometimes they do board level removal of imbedded chips.  This is dangerous because the original board can be damaged.

Sometimes they actually will connect leads to the chips on the board.  Safer but harder... better chance of crossing pins, ect.

Sometimes they can read the leads from other locations on the board.

Sometimes they create a trojan.  What they do is load a program by hand into the memory (RAM) that will read each memory location in ROM and send it out a port to be read by another computer.  This can be tricky since most of these boards don't have outports.  So they might send values out to a LED that they have control on or something similar.  This is usually a last resort because of the time it takes... and the chance of errors... But its is a great way to get around many hardware encryptions (since they are usually unencrypted by the time it gets to the processor)... This is how (I believe... don't know the specifics) the CPS2 boards are now dumped to get the XOR files.

F|end:
LOL!

This thread is almost becoming a 'how to hack your games' step by step! LOL


I wonder if the newbies are at home trying to make some hacking with their genesis and stuf! LOL


...i'm not!  ;D
Tiger-Heli:
Here's the guy who dumps most of the stuff for MAME:

http://unemulated.emuunlim.com/

He has pictures of the equipment he uses also.
grafixmonkey:

--- Quote from: Lilwolf on July 02, 2003, 10:36:52 am ---This is usually a last resort because of the time it takes... and the chance of errors... But its is a great way to get around many hardware encryptions (since they are usually unencrypted by the time it gets to the processor)...

--- End quote ---

Hey wow, I just thought of all that BS with the digital milennium copyright act and the DVD industry...  (ppl got asses sued for making code to break encryption)
I wonder if this "gets around" the DMCA?  because you haven't broken any encryption at all, you let the original device do it and just grabbed the unencrypted data on the other side.  

Just a bit of idle curiosity.  (very U.S. too - may or may not make any sense to you people in australia and UK etc.)
Navigation
Message Index
Next page
Previous page

Go to full version