Your right! I'll get the wrench and head over too volvo R&Dvtl wrote: ↑29 Nov 2023, 07:00You approach it wrong. https://xkcd.com/538/oscilloscope wrote: ↑29 Nov 2023, 06:48 Interesting... , the reason I'm trying too is to write a program to perform the synchronisation for the sid807evo and p2 cem unit. Codecard pulled the application for sale & the application is near impossible too crack unless you know how to reverse Oreans now called Themida. , I have tried and tried.. I had tried capturing the data with a logic analyzer. But that didn't capture anything of use. As I would need 144 pin analyzer which would probably cost a billion pounds. ( sarcasm)
Vida CEM swapping
-
oscilloscope
- Posts: 285
- Joined: 20 May 2022
- Year and Model: 2005
- Location: uk
- Has thanked: 27 times
- Been thanked: 11 times
Re: Vida CEM swapping
-
oscilloscope
- Posts: 285
- Joined: 20 May 2022
- Year and Model: 2005
- Location: uk
- Has thanked: 27 times
- Been thanked: 11 times
What approach shall I take ?vtl wrote: ↑29 Nov 2023, 07:00You approach it wrong. https://xkcd.com/538/oscilloscope wrote: ↑29 Nov 2023, 06:48 Interesting... , the reason I'm trying too is to write a program to perform the synchronisation for the sid807evo and p2 cem unit. Codecard pulled the application for sale & the application is near impossible too crack unless you know how to reverse Oreans now called Themida. , I have tried and tried.. I had tried capturing the data with a logic analyzer. But that didn't capture anything of use. As I would need 144 pin analyzer which would probably cost a billion pounds. ( sarcasm)
-
dikidera
- Posts: 1305
- Joined: 15 August 2022
- Year and Model: S60 2005
- Location: Galaxy far far away
- Has thanked: 67 times
- Been thanked: 175 times
I mean there are dozens of automatic Themida unpackers on github, though it's a long shot if they work for you. Back in the day Oreans were one of the few who made an obfuscation virtual machine for their packer/protector. Themida back then was what Denuvo is for us today. With the exception of Starforce and SecuROM.
I sunk months of reverse engineering a particular SecuROM game, to the point of writing my own control flow graph generator with which I could then find all the small code checks which prevented software breakpoints. Then there was the securom vm. Fun times.
Point is you need a lot of time + experience to attempt to RE such a thing.
I sunk months of reverse engineering a particular SecuROM game, to the point of writing my own control flow graph generator with which I could then find all the small code checks which prevented software breakpoints. Then there was the securom vm. Fun times.
Point is you need a lot of time + experience to attempt to RE such a thing.
-
oscilloscope
- Posts: 285
- Joined: 20 May 2022
- Year and Model: 2005
- Location: uk
- Has thanked: 27 times
- Been thanked: 11 times
This is true. , my Reverse engineering skills are limited at best. And one thing I don't have is alot of time. But I'll look into the oreans upackers in git and see what they do and how they work maybe they will edge the idea closer or just go down a bottomless rabbit hole.dikidera wrote: ↑30 Nov 2023, 13:46 I mean there are dozens of automatic Themida unpackers on github, though it's a long shot if they work for you. Back in the day Oreans were one of the few who made an obfuscation virtual machine for their packer/protector. Themida back then was what Denuvo is for us today. With the exception of Starforce and SecuROM.
I sunk months of reverse engineering a particular SecuROM game, to the point of writing my own control flow graph generator with which I could then find all the small code checks which prevented software breakpoints. Then there was the securom vm. Fun times.
Point is you need a lot of time + experience to attempt to RE such a thing.
-
oscilloscope
- Posts: 285
- Joined: 20 May 2022
- Year and Model: 2005
- Location: uk
- Has thanked: 27 times
- Been thanked: 11 times
It was an option trying to reverse engineer the application, but that might be abit too time consuming. , now looking down the CAN sniffing route might be a option which could work. It's a question of what software would be easy to use , and have minimal knowledge to control it. , I did discover a cheap tool from Russia called CANHACKER , it "seems" very capable and would also appear to do quite alot with being about too adjust the data directly from the eeprom. (Amongst other things ) which this is very intriguing and could make the synchronisation quest easier. I have a number of test ecus & cems from a c30 , and a s40 i think it is , all around 2010 -2012 with the sid807 & p1 cem.dikidera wrote: ↑30 Nov 2023, 13:46 I mean there are dozens of automatic Themida unpackers on github, though it's a long shot if they work for you. Back in the day Oreans were one of the few who made an obfuscation virtual machine for their packer/protector. Themida back then was what Denuvo is for us today. With the exception of Starforce and SecuROM.
I sunk months of reverse engineering a particular SecuROM game, to the point of writing my own control flow graph generator with which I could then find all the small code checks which prevented software breakpoints. Then there was the securom vm. Fun times.
Point is you need a lot of time + experience to attempt to RE such a thing.
-
vtl
- Posts: 4727
- Joined: 16 August 2012
- Year and Model: 2005 XC70
- Location: Boston
- Has thanked: 114 times
- Been thanked: 606 times
Pin cracker was done using a cheap counterfeit fork of Saleae Logic. I now have a real DSLogic Plus, which also has a nicer software than the new version of Saleae sw (in my opinion). Both can do CAN and LIN and many other protocols. Used one to develop a driver for 93c86 EEPROM.oscilloscope wrote: ↑03 Dec 2023, 08:21 It was an option trying to reverse engineer the application, but that might be abit too time consuming. , now looking down the CAN sniffing route might be a option which could work. It's a question of what software would be easy to use , and have minimal knowledge to control it. , I did discover a cheap tool from Russia called CANHACKER , it "seems" very capable and would also appear to do quite alot with being about too adjust the data directly from the eeprom. (Amongst other things ) which this is very intriguing and could make the synchronisation quest easier. I have a number of test ecus & cems from a c30 , and a s40 i think it is , all around 2010 -2012 with the sid807 & p1 cem.
Once a bulk of the protocol exchange is sniffed/understood, experimenting is way more convenient using a programmable board, which you can write software for in C or Python.
I think we had this discussion in past?
-
oscilloscope
- Posts: 285
- Joined: 20 May 2022
- Year and Model: 2005
- Location: uk
- Has thanked: 27 times
- Been thanked: 11 times
We had , but the issue I was gaining was when I connected up the analyzer the information I gained made little to no sense with no frame of reference to guide me. , I had alot of information when I placed the key into the ignition and simulated the starting. The information was vast and I couldn't differentiate what was the synch check to what immo data to Start request. , the analyser Is a great bit of kit , I found I could use it to passively read a memory chip in a vic20. , without it interfering with the operation. Which I found other tools cant do very well. The idea in my head was have a tool which has a well planned out application and gives me good discernable data which makes sense. , for a laugh I connected up my cando tool that thing is not good. That just gives a CAN stream with strange PID data id'svtl wrote: ↑03 Dec 2023, 08:31Pin cracker was done using a cheap counterfeit fork of Saleae Logic. I now have a real DSLogic Plus, which also has a nicer software than the new version of Saleae sw (in my opinion). Both can do CAN and LIN and many other protocols. Used one to develop a driver for 93c86 EEPROM.oscilloscope wrote: ↑03 Dec 2023, 08:21 It was an option trying to reverse engineer the application, but that might be abit too time consuming. , now looking down the CAN sniffing route might be a option which could work. It's a question of what software would be easy to use , and have minimal knowledge to control it. , I did discover a cheap tool from Russia called CANHACKER , it "seems" very capable and would also appear to do quite alot with being about too adjust the data directly from the eeprom. (Amongst other things ) which this is very intriguing and could make the synchronisation quest easier. I have a number of test ecus & cems from a c30 , and a s40 i think it is , all around 2010 -2012 with the sid807 & p1 cem.
Once a bulk of the protocol exchange is sniffed/understood, experimenting is way more convenient using a programmable board, which you can write software for in C or Python.
I think we had this discussion in past?![]()
-
vtl
- Posts: 4727
- Joined: 16 August 2012
- Year and Model: 2005 XC70
- Location: Boston
- Has thanked: 114 times
- Been thanked: 606 times
How canhacker could help here?oscilloscope wrote: ↑03 Dec 2023, 08:57 We had , but the issue I was gaining was when I connected up the analyzer the information I gained made little to no sense with no frame of reference to guide me. , I had alot of information when I placed the key into the ignition and simulated the starting. The information was vast and I couldn't differentiate what was the synch check to what immo data to Start request
-
oscilloscope
- Posts: 285
- Joined: 20 May 2022
- Year and Model: 2005
- Location: uk
- Has thanked: 27 times
- Been thanked: 11 times
Well if I am reading the information correctly on the CANhacker site , you can read the CAN information and then it has a tracer function which can trace the can function call as in real time , and trace if from to the memory location. Which potentially maybe what I require.vtl wrote: ↑03 Dec 2023, 09:20How canhacker could help here?oscilloscope wrote: ↑03 Dec 2023, 08:57 We had , but the issue I was gaining was when I connected up the analyzer the information I gained made little to no sense with no frame of reference to guide me. , I had alot of information when I placed the key into the ignition and simulated the starting. The information was vast and I couldn't differentiate what was the synch check to what immo data to Start request
-
dikidera
- Posts: 1305
- Joined: 15 August 2022
- Year and Model: S60 2005
- Location: Galaxy far far away
- Has thanked: 67 times
- Been thanked: 175 times
After dumping my TCM from a facelift P2 I saw that the CAN signal configuration and the underlying interfaces have changed vastly and the IDs there are not stored as plaintext as they once were with the pre-facelift cars. I am annoyed by this as it means I have to reverse it again to see the final CAN ID.
In the meantime I saw that GSM<->TCM module communication is maybe done via CEM e.g CEM is translating GSM module messages via CEM's LIN bus interface? I can't determine if it has a LIN controller inside.
Why is this important? It means it may be possible to emulate paddle shifting without having geartronic equipped. The only foreseeable problem is that I can spoof a CEM message with paddle shift information but the CEM then may retransmit the original contents thereby disabling QuickShift causing unpredictable behaviour of the box. Exciting!
In the meantime I saw that GSM<->TCM module communication is maybe done via CEM e.g CEM is translating GSM module messages via CEM's LIN bus interface? I can't determine if it has a LIN controller inside.
Why is this important? It means it may be possible to emulate paddle shifting without having geartronic equipped. The only foreseeable problem is that I can spoof a CEM message with paddle shift information but the CEM then may retransmit the original contents thereby disabling QuickShift causing unpredictable behaviour of the box. Exciting!
-
- Similar Topics
- Replies
- Views
- Last post
-
- 1 Replies
- 6431 Views
-
Last post by RickHaleParker
-
- 5 Replies
- 8699 Views
-
Last post by forumoto






