Remoticon 2020 // PCB Reverse Engineering Workshop
ฝัง
- เผยแพร่เมื่อ 30 พ.ย. 2020
- Ever needed the schematic for a PCB you didn’t design? Maybe you’re trying to repair it, modify it, or just understand how it works. However, you can’t find a service manual or even just a blurry photocopy of a schematic. In this workshop, Eric Schlaepfer helps us learn some techniques for reverse engineering 2-layer PCBs.
Eric is a hardware hacker, cathode ray tube aficionado, and vintage computer enthusiast. He enjoys both forward and reverse engineering. He is well known for his MOnSter 6502, which is a gigantic PCB version of the 6502 microprocessor made out of individual transistors, as well as several other projects including the Snark Barker, a clone of the original Sound Blaster sound card.
Learn more about Eric: / tubetimeus
Read the article on Hackaday: hackaday.com/?p=450394
Visit the workshop page (slides available here): hackaday.io/project/175076-re...
Music by Rich Hogben - วิทยาศาสตร์และเทคโนโลยี
It would be useful to add the links in the video description to some of the sites that were mentioned during the video.
thanks!
Kinda what we all do - I was hoping something ground breaking. I'm using super bight LED work lights and a camera to "see" into 2 layer boards. The trick I use is that I take the images with a camera that does 14bit. If you get the exposure right, can differentiate the layers.
Great explanations .Thanks a lot .
Looks like a video from the 90s XD.
But really great and informative talk!!!! Learned alot.
Actually it doesn't you must be incredibly young
Awesome video , deep knowledge , but for beginners , little difficult to understand , anybody have video's , reverse engineering small circuit's , for example circuit's of REMOTE CONTROL toys , explaining everything in detail , how signal is transmitted from transmitter to receiver to control the motors , explaining working of every electronic components used and why it is used . Please forgive if my request is childish
Dear Eric, is it possible to get a copy of all links that you talk about (you mentionned that participants shared useful links in the live session chat) ?
Thanks for this very interesting workshop
Which software are you using in this video for making circuit?
KiCad
I am a new subscriber I was looking to learn on how to reverse engineering a ecu ecm board..I hope this will give some idea.
Your problem is in the eeprom, copy data into a new eeprom, then the car will run again👍.. oh but the unit must be readapted with VCDS, otherwise it won't be detected as its own ecu or ecm👍
I know what he means by designator, outer markings and part number, but what the heck is the "package" column in his spreadsheet? Can anyone explain? I'm self-teaching myself about circuitry and somewhat of a noob, thanks!
Package refers to the physical size/layout standard used by each component. These standards specify the size of the component, number and location of electrical contacts, etc.
Why make things an hour long and not make it easy for people to learn so that way people just take a break without losing were they were still trying to find an easy way to learn a I learned a little bit differently than others
Hands on but poor planning. Everyone should've just had a common circuit like a step generator kit already put together. Not a troll reverse engineering is awesome. Did your best with what was available.
What? You're just gonna gloss over the infamous chinese spy chip? At least give us a link or something to find out more!
I think that he's joking around. There is no Chinese spy chip. It's just a small discrete component that conspiracy theorists who know nothing of electronics are claiming is a spy chip.
Note the smiley face after spy chip in the label.
@@djmips I did some googling. Chinese spy chips are real. It's the reason the Huawei executive was arrested some years back.
She was arrested for 'trade secrets theft' and Huawei is in the business of telecom equipment not chips. I don't doubt there are some spying going on but so far no chips have been proven.