crchack
Reversing CRC for fun and profit (by resilar)
Our great sponsors
crchack | ghidra_tc1791_registers | |
---|---|---|
1 | 1 | |
180 | 12 | |
- | - | |
6.7 | 1.8 | |
about 1 month ago | over 3 years ago | |
C | ||
The Unlicense | - |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
crchack
Posts with mentions or reviews of crchack.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-03-07.
-
Simos18 Supplier Bootloader (SBOOT) Exploit: Reading Boot Passwords
After the Seed/Key process was figured out, the CRC exploit was very obvious as the bounds checking is blatantly broken. https://github.com/resilar/crchack came in handy to take the CRC + unknown data and back-generate the correct data used to produce the CRC.
ghidra_tc1791_registers
Posts with mentions or reviews of ghidra_tc1791_registers.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-03-07.
-
Simos18 Supplier Bootloader (SBOOT) Exploit: Reading Boot Passwords
As for my process: I loaded up SBOOT in Ghidra using a register map I built using available TriCore toolchain information: https://github.com/bri3d/ghidra_tc1791_registers . Then I literally just, well, read the code. The GPT timing comparisons were easy to find from access to the GPTA registers, but it took a long time to realize the base frequency the PLLs were locked at (8.75Mhz) to translate the cycle-timing back into real timing.
What are some alternatives?
When comparing crchack and ghidra_tc1791_registers you can also consider the following projects:
gtkhash - A cross-platform desktop utility for computing message digests or checksums
Simos18_SBOOT - Documentation and tools about Simos18 SBOOT (Supplier Bootloader), including a Seed/Key bypass and Tricore boot password recovery tool.
digest-crc - A Cyclic Redundancy Check (CRC) library for Ruby.
TC1791_CAN_BSL - CAN Bootstrap Loader (BSL) for Tricore AudoMAX (TC1791 and friends), including arbitrary read/write as well as compressed read functionality.
odf-nano - ODF-Nano lets you deploy OpenShift Data Foundation on your Laptop (CRC)
radare2-book - Radare2 official book