Deep Sea Generator Control Panel - PIN Code | Can I figure it out?

Sdílet
Vložit
  • čas přidán 8. 03. 2024
  • In this video we're going to be looking at a Deep Sea Generator Control Panel Model DSE5310. The owner bought it from an auction and wants to adjust a setting, but unfortunately it has a pin code set which is unknown.
    Come join me while I see if it's possible to figure out the pin code or remove it completely and what other things will I discover!
    I'm not an expert, but I do enjoy trying to fix things.
    If you enjoyed this video, or found it useful or helpful, please consider subscribing. It's free and you'll be notified when I upload more videos.
    Thank you for your support!
    Some of the tools and equipment that I use:
    The Famous Blue Mat: amzn.to/47bPNGK
    Infiray P2 Pro Thermal Camera: amzn.to/47c05Xm
    170 piece electronics tool kit (security bits): amzn.to/3FGLWpr
    SMD Tweezer set: amzn.to/3t9GlW4
    Aixun T3A Soldering Station: amzn.to/3u2SBri
    Soldering Flux: amzn.to/3UDC0py
    Low Melt Solder: amzn.to/3QICZ5r : Cheaper Alternative amzn.to/3G4L3XK
    Grinding pen: amzn.to/3QCHE7v
    Component Tester: amzn.to/46UcHm6 alternative (slightly cheaper) amzn.to/49yZSzJ
    Overhead Camera Mount I Use: amzn.to/3tX8Ar4
    Microscope Light (I use on my Trinocular): amzn.to/3FEAPgy
    AD409 Pro Microscope 10" Screen: amzn.to/3G0CI7P
    Extra Long Torx Drivers(used on Milwaukee radio): amzn.to/40siUU3
    DC Power Adapter plugs 38 PCS: amzn.to/49lCUMm
    USB Power Meter Tester: amzn.to/47VOEn9
    Other Equipment:
    Main Overhead camera: Sony HDR-CX450 with 3rd party remote and RODE VideoMic Pro
    Other cameras: Canon G7X, iPhone 6
    Microscopes: Amscope trinocular (clone) with FHD 48MP Camera V8
    & Adonstar AD409 Pro.
    Editing Software: DaVinci Resolve
    The above links are amazon affiliate links, and I may receive a small amount from Amazon at no extra cost to you, if you choose to purchase an item.
    #electronics #electronicsrepair #repair
    Deep sea control panel pin code removal
    Deep sea forgot pin code
    Deep sea lost pin code
    DSE forgot pin code
    Lost Generator pin code
    Generator pin code recovery
    Generator pin code removal
    Remove generator pin code
    Forgotten generator pin code
    Reset generator pin code
    Generator pin code reset
  • Jak na to + styl

Komentáře • 696

  • @garymucher4082
    @garymucher4082 Před 3 měsíci +237

    WOW, this takes me back to when I was a programmer. We needed to modify a piece of test equipment that was bought from a company to expand it's capability to include more equipment testing. They refused to hand us the raw code and stated they would reprogram it for $1 million dollars. So two of us took the EPROM(S) out and read them. Not knowing where the program started or stopped addressing wise, we basically had to search the code to see what they did. It took a few weeks, but we broke the code and added our additional code and WALA, we saved so much money and knew exactly how they coded it...and was able to make it do whatever we wanted with it. Thumbs Up!

    • @Ea-Nasir_Copper_Co
      @Ea-Nasir_Copper_Co Před 3 měsíci +53

      It's "voila".

    • @nyetloki
      @nyetloki Před 3 měsíci +42

      Now a days you'd be arrested for criminal copyright infringement and DMCA violations

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci +36

      World sucks now, too much rules and regs

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci +32

      Yes, if you like this stuff check out the ultrasound scanner I looked at and bypassed the engineer code and unlocked a ton of extra features, or the video called no password no problem where I fixed a solar inverter and they wouldn't give me a service code, I found some interesting stuff in there 😂😂😂👍

    • @diemaschinedieviereckigeei2941
      @diemaschinedieviereckigeei2941 Před 3 měsíci +9

      It's "wallah".

  • @steubens7
    @steubens7 Před 3 měsíci +44

    i work in infosec and do hw reverse engineering and i'm so excited when there's like a "crossover" and a wide audience gets to experience this sort of thing & i've been loving that they're just tossed in with regular repair videos, because they are regular repairs!

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci +4

      😂😂😂👍sounds interesting. I've done a bit myself but just for my own use or because I can 🙂

  • @iantyler4045
    @iantyler4045 Před 3 měsíci +78

    It must be easy money for the manufacturer to reset the pin but for you it was "Challenge accepted". Very well done.

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci +7

      Thank you 👍yes exactly like the video I did on the passworded solar inverter video 'challenge accepted ' 😂😂😂

    • @pseudomemes5267
      @pseudomemes5267 Před 3 měsíci +2

      It's crazy that they made that entire interface card that amounts to just an eeprom programmer. L

    • @ThePoxun
      @ThePoxun Před 3 měsíci +5

      Certainly will be easy money... and they probably don't even need to do any soldering as it looks like the data lines for the memory chip actually run to that header. They probably have a device that plugs right in and wipes it so no expertise beyond opening the case and plugging something in would be required.

    • @mfx1
      @mfx1 Před 3 měsíci +1

      I doubt he's doing it for free either.

    • @renakunisaki
      @renakunisaki Před 3 měsíci +3

      Reminds me of when Gateway wanted $$$ to reset the "forgotten" BIOS password on my laptop. I hadn't actually forgotten it; it was "". That is, it was 0 characters long, as I changed it to that when trying to remove it. But the BIOS doesn't let you continue without typing at least one character, so it was impossible to enter.
      I ended up finding the backdoor password generator instead. Screw you and your convenient bugs, Gateway!

  • @terrym1065
    @terrym1065 Před 3 měsíci +82

    I knew immediately when I saw the computer screen and the programmer hooked up I was in trouble... You definitely have some exceptional skills sir. Appreciate these diagnose and repair videos, shows me just how much determination it takes to get the job done. Enjoy!

  • @generaldisarray
    @generaldisarray Před 3 měsíci +45

    Outstanding work sir, well done.
    Note to self, never buy a 2nd hand car off this man. No matter how much he swears that the milage is genuine, there's just no way a 1998 Toyota Corolla, with that much wear and tear, can have only 1,234 miles on it. NO WAY, but it does seem like such a good deal though...🤣🤣🤣🤣

  • @pdrg
    @pdrg Před 3 měsíci +5

    I didn't think you stood a chance, great work.
    And "2000" is such a 1990's password lol

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci

      Thanks 👍I've done quite a few things like this, such as the solar inverter where I needed the service password or the AVerMedia capture card where I had to rebuild the firmware or the medical ultrasound where I unlocked a ton of hidden features and made it run Doom. Check them out if you haven't already seen them 👍

  • @lis6502
    @lis6502 Před 3 měsíci +7

    13:42 easiest approach would be:
    - blanking
    - running once to set the configuration data
    - A. setting up known pin
    - reading flash
    - B. setting up known pin
    - reading flash.
    Then, after comparing differences between A and B would give you only changes in supposed checksum and pin itself.

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci +3

      Yes, setting I had thought of that but setting up a known pin required hardware that I didn't have, also sometimes blanking an eeprom doesn't always leave a device in a usable state. This was the case with the tractor dashboard I helped someone repair by dumping the eeprom from mine so they had some default values. The video is on here too👍

  • @tomharris1457
    @tomharris1457 Před 3 měsíci +16

    Clever! I sold Winco Generators until I retired. The Deep Sea controllers were very reliable, and fortunately came without a pass code! Now I see the "trick" to making a low hour unit, like new!

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci

      Thanks 👍

    • @rysacroft
      @rysacroft Před 3 měsíci +2

      My landlord bought a 6 KW turbine, it's windy here so it generates about £5000 a year For an install price of £30000 it paid for itself in six years. That's better than the interest rate of the banks!
      FYI, you cannot get a bank loan for any turbine that has a gearbox.

  • @kmonyt
    @kmonyt Před 3 měsíci +18

    My goto approach for these type of things is to use a logic analyzer. Watch the thing live when entering a code. While it could be loaded on bootup, just knowing what addresses the uC accesses allows you to narrow down faster. Same approach I used with a debugger for software key bypasses. You've got great patience to keep pulling/resoldering but I'd be slightly worried about stressing the PCB. I'm sure it's fine, but passively watching the memory reads is just easier! Nice work!

    • @kmonyt
      @kmonyt Před 3 měsíci

      Sorry, just seeing your other comments now about the log file writing getting in the way of monitoring. Watching for READS from the chip could allow you to separate those log file writes from configuration reads. My preference is to collect all the accesses from startup to pin code entry, and then sort through the data. I use python pandas to read the csv's.

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci +4

      Thanks 👍Great minds think alike! I had thought of that approach too, but when I scoped the i2c pins of the eeprom there constantly data access before even pressing anything. I think this was the MCU writing log files continuously because of the sensors being disconnected, and possibly writes to the display which seem to be on the same bus.

  • @sebastian_harnisch
    @sebastian_harnisch Před 3 měsíci +20

    I'm always surprised by the fact that so many commercial/industrial electronics don't use a checksum. I sometimes do even for hobby projects. Great video!

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci +2

      Thanks 👍

    • @pseudomemes5267
      @pseudomemes5267 Před 3 měsíci +1

      You'd hope they're backing up that lack of check summing with robust error handling

    • @sebastian_harnisch
      @sebastian_harnisch Před 3 měsíci +2

      @@pseudomemes5267 yeah, but if I’m not willing to implement a simple checksum, am I willing to spend the time and effort to build a robust system? Hmm…

    • @steubens7
      @steubens7 Před 3 měsíci

      the "return for service" impulse is very strong, companies learn a lot about how their devices are used in the process

    • @marklatimer7333
      @marklatimer7333 Před 3 měsíci +1

      In my experience checksum all only required on data that doesn't change (such as calibration data) that would be detrimental if it did therefore you need to be able to detect memory failures.
      Number of Hours run changes quite frequent and isn't life and death so why bother?
      Remember, the more tests you have the more chance something going wrong - KIFS.

  • @thinking-monkey
    @thinking-monkey Před 3 měsíci +4

    Mix equal parts: 1) Detective, 2) Genius, 3) Electronics Expert... This fix was most excellent! Well played, sir! 👍

  • @MrBaldypete1
    @MrBaldypete1 Před 3 měsíci +5

    That was thoroughly enjoyable to watch mate! It's always satisfying working out little company secrets like this!

  • @fixitagaintomorrow3132
    @fixitagaintomorrow3132 Před 3 měsíci +16

    You are such a clever fella! Another great vid.

  • @davida1hiwaaynet
    @davida1hiwaaynet Před 3 měsíci +6

    Lovely! I have worked on Caterpillar generator sets with DSE controls on them. They were quite a bit ahead of their time when new. You can even build custom logic to add to the basic functionality and pass logic variables between two DSE controllers. The model we had was equipped with mains and generator synchronization. I worked on a project in Nigeria with two of these connected common bus with the DSE communication bus in place for allowing for them to be used as a two-unit plant. Seeing this brings back memories from my 4.5 months in Nigeria offshore working with some very good people from around the world. Glad you were able to save this one!

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci +1

      Thank you kindly, and thanks for sharing your interesting story from Nigeria!

    • @davida1hiwaaynet
      @davida1hiwaaynet Před 3 měsíci +1

      @@BuyitFixit You're welcome, and thanks for sharing your repairs via your videos!

  • @epicawesomesauceguy
    @epicawesomesauceguy Před 3 měsíci +10

    I knew immediately upon seeing the comparison that it was D0 07, as those were the four digits that ended up being 00 00 in the nopw file :D excellent video, thank you for helping me learn

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci +2

      Thanks 👍and thanks for your input 🙂

    • @SteltekOne
      @SteltekOne Před 3 měsíci

      Same! As soon as I saw the 00 00 on the no-PIN side and D0 07 on the original, I guessed that that was where the Hex interpretation of the PIN was.
      Great video showing how to explore basic microcode data storage mechanisms!

  • @blacklisted4885
    @blacklisted4885 Před 3 měsíci +5

    Great work! If only we all had such pals

  • @dont-want-no-wrench
    @dont-want-no-wrench Před 3 měsíci +5

    beautiful! i just love this kind of detective work.

  • @Dime_Bar
    @Dime_Bar Před 3 měsíci +7

    Back in the day i worked in a factory making fire alarms and there was a certain range of panels you could change the engineer code, and if you forgot it you had to send it back to us. We would then take out the eprom and read the data then using a chart we would look at a certain part of the code which was in hex then convert it to decimal to get the code.

  • @DB25k
    @DB25k Před 3 měsíci +2

    Absolutely technical artist at work. This was a fantastic marvel and reminds me of develing into code years ago.. thanks so much for sharing....

  • @brianvincent6266
    @brianvincent6266 Před 3 měsíci +2

    You analytical skills are exceptional.

  • @Jesselovespinball
    @Jesselovespinball Před 3 měsíci +6

    You really do know your stuff! I’ve commented before that swapping components is easy for me , but when it comes to programming chips and decoding them , that’s a whole different level of cool! Well done 👍

  • @mikecass8306
    @mikecass8306 Před 3 měsíci +2

    A man of many talents, thanks Mick 😀

  • @mattsmalley5780
    @mattsmalley5780 Před 3 měsíci +3

    As always mate, absolutely amazing. Love your videos 👏

  • @derekholme6922
    @derekholme6922 Před 3 měsíci +1

    Now then Bonny Lad, I thouraley enjoy your videos, understand some of it but love the way you work around to find a solution, Thank you.

  • @pgsss6354
    @pgsss6354 Před 3 měsíci +1

    As always, excellent job! You 're a genius.
    Congrats!

  • @101thenuke
    @101thenuke Před 3 měsíci +1

    Must admit I really enjoy all your video's. Informative and a nice pleasant manner, thanks

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci

      So nice of you 👍 Thanks 🙂

  • @cecildramat-ps9eq
    @cecildramat-ps9eq Před 3 měsíci +1

    Hi hope you doing well and thank you for another great video that flabbergasted me from normal electronic repair, programming, binary and converting to hexadecimal and be able to change values, you are just a genius man there is nothing else to it. 😅🥶

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci

      Hi, thank you for your kind comment 👍

  • @kentswan3230
    @kentswan3230 Před 3 měsíci +1

    well done! It just prooves that going down some rabbit holes is productive.

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci

      Thanks 👍Yes indeed 😂😂

  • @mazafreno
    @mazafreno Před 3 měsíci +3

    As usual unbelievable job, thank you for your videos.

  • @ThriftyToolShed
    @ThriftyToolShed Před 3 měsíci +2

    Well done! I enjoyed watching it, thanks for sharing!

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci +1

      Glad you enjoyed it, Cheers Thrifty 👍

  • @nickdaria
    @nickdaria Před 3 měsíci +2

    Very good work. This feels very similar to reverse engineering my CAN bus on my car. Hunting for data in the seemingly random raw output.

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci

      Thanks 👍Yes I've messed around with CAN bus stuff ages ago when messing with an old VW dashboard.

  • @dosgos
    @dosgos Před 3 měsíci +8

    Fascinating video! More of these chip analysis videos if possible.

  • @ducatisteve20081
    @ducatisteve20081 Před 3 měsíci +1

    Your knowledge is so vast love the vids keep up the good work .

  • @MrMaxeemum
    @MrMaxeemum Před 3 měsíci +7

    It's always nice to make the numbers match what you expect. It gives that nice warm glowing feeling knowing that you worked it out. Your soldering skills (sodering for the Americans watching) are top notch, If that was me the PCB would be destroyed after 3 or 4 removals (I must do some more practice)

  • @VoeViking
    @VoeViking Před 3 měsíci +2

    Another great fix. Cheers.

  • @davidchang-yen1256
    @davidchang-yen1256 Před 3 měsíci +3

    Once again I am just astounded at your sleuthing skills - the Sherlock Holmes of electronics you are 😂
    Excellent work as always!

  • @MyTubeSVp
    @MyTubeSVp Před 3 měsíci +2

    That’s some serious skills right there! 👍

  • @nigelholland24
    @nigelholland24 Před 3 měsíci +2

    Explained very well great video

  • @dennishammond3126
    @dennishammond3126 Před 3 měsíci +1

    That was super informative, thank you Sir from TX

  • @johnhousego9218
    @johnhousego9218 Před 3 měsíci +2

    Another really interesting video and very informative, thank you.

  • @marcseclecticstuff9497
    @marcseclecticstuff9497 Před 3 měsíci +3

    I had to do something similar on my Chevy Avalanche gauge cluster when the memory got corrupted from rapidly power cycling the key while troubleshooting the fuel system. Used gauge clusters were $$$ and the now permanent error message tweaked my OCD. I didn't want to be soldering/desoldering the chip a million times so I soldered a 8-pin DIP socket on the board so I could directly plug the zif socket adapter from the MiniPro straight onto the dash for testing. The data was obfuscated and stored in several different places in memory. I didn't take the time to reverse engineer the obfuscation method, I simply played around with the data until the mileage was correct. I wasn't sure what the exact mileage was so I just rounded up to 150,000 so I knew I wasn't putting less on it than it had. It was a great bit of fun!

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci +1

      Nice, I also did something similar with a tractor dashboard a few video's back.The video is called "helping someone 10,323 miles away" as it was someone that needed a dump from my tractor dashboard who lived in Australia as he had a unit that wouldn't power up due to a corrupt EEProm. I managed to find the mileage in that, and it was stored as binary coded decimal.

  • @sean9595
    @sean9595 Před 3 měsíci +6

    I wish you were my next door neighbour and I would never have a problem again 👍🏼👍🏼👍🏼😎

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci +1

      My neighbours think so too 😂😂😂👍

  • @FuzzyTekShow
    @FuzzyTekShow Před 3 měsíci +2

    Great video, love that you got carried away and started changing other bytes to satisfy the curiosity! :P

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci +1

      Thanks 👍The same thing happened when I looked at a medical ultrasound scanner, I ended up unlocking a ton of stuff and running doom on it. (video is on here too) and similar to the "No password, no problem" solar inverter video too where I found tons of hidden stuff 😉

    • @FuzzyTekShow
      @FuzzyTekShow Před 3 měsíci +1

      @@BuyitFixithaha love it, I'll check it out!

  • @torfinnsrnes6232
    @torfinnsrnes6232 Před 3 měsíci

    Good detective work. Excellent work. 😊

  • @rory9174
    @rory9174 Před 3 měsíci +7

    Blown away, that's repair on another level. I'm guessing this is similar tech knowhow to car clocking. Great video, thank you.

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci +1

      Thanks, yes exactly. Check out the video I did on the tractor it was called helping someone 10323 miles away, it is very similar 👍

  • @Marshmish
    @Marshmish Před 3 měsíci +2

    Nice work Mick, you make it look so easy! suppose it is if you know what your doing.

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci +1

      Thanks 👍 Yes, I'm pretty good at working things out 🙂

    • @Marshmish
      @Marshmish Před 3 měsíci

      @BuyitFixit Looking forward to a catch up with your other content.

  • @309electronics5
    @309electronics5 Před 3 měsíci +1

    That was quite interesting! I also love some messing arround with raw bytes. I already changed the name and number of a product by overwriting the bytes associated with it. Interesting and i love messing with bytes in a eeprom or flash

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci

      Thanks 👍Yes you and me both. I used the same programmer with the Stihl headset I just repaired, and with the Tractor dashboard I looked at (helping someone 10,323 miles away). If you like this type of stuff also check out the video I did called "no password no problem" 😉

  • @andrewthornton5783
    @andrewthornton5783 Před 3 měsíci +1

    Amazing deductive work 🤯

  • @Karthor.
    @Karthor. Před 3 měsíci +1

    I like these videos, did something similar with an old Volvo radio i had found outside that had a pincode on it, found dumps online and i knew the password to the dumps so i could figure out where the password where stored in it

  • @loopdemack
    @loopdemack Před 3 měsíci +6

    I think this is your best video, especially because you tried it for 30 times.

  • @madrafboy
    @madrafboy Před 3 měsíci +4

    Nice bit of forensic electronics.

  • @repairchannel
    @repairchannel Před 3 měsíci +1

    That was so much fun! Thank you :)

  • @greebo7857
    @greebo7857 Před 3 měsíci +1

    Very cool detective work.

  • @kareno8634
    @kareno8634 Před 3 měsíci +1

    *Really Coo,l* but confusing. lol Seeing you master these chips brings the whole *marvel of knowledge* i sadly missed.

  • @marklewus5468
    @marklewus5468 Před 3 měsíci +1

    I have been repairing this kind of stuff for 40+ years. I really like your approach and I’ve learned a lot from you. I have a success rate around 80%+ for electronic repairs. I’m sure yours is even better, but it would be interesting to see a video of something that you ultimately couldn’t fix. Sometimes we learn more from our failures than from our successes. Thanks

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci

      Thanks 🙂Check out the circuit vinyl plotter or the Dyson fan or circular saw. Although I did manage to fix two of those items once I was sent parts from a donor unit 👍

  • @richb419
    @richb419 Před 3 měsíci +1

    Hi, good video! I thought that device looked familiar, I used to take care of many large generator dry land sets and some of them had that control panel.

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci

      Thanks 👍and also thanks for the info 🙂

  • @Belginator
    @Belginator Před 2 měsíci +1

    Very clever dude, very enjoyable

  • @TrickZ666
    @TrickZ666 Před 3 měsíci +1

    next level problem solving 👍🏻 wow

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci

      Thanks 👍If you like this sort of stuff check out the solar inverter one I did called "no password no problem" I've done a few other videos similar to this one on my channel.

  • @jdmccorful
    @jdmccorful Před 3 měsíci +1

    Very cool.Nice work.

  • @artursmihelsons415
    @artursmihelsons415 Před 3 měsíci +1

    Great job!
    Nice, that there wasn't a crc..
    I did similar things with different devices.. 😂 It's always a fun to figure out meaning of stored data.

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci +2

      Thanks 👍yes, I've worked on stuff before where there was a CRC and there are quite a few different methods for calculating them.

  • @crazycarl9484
    @crazycarl9484 Před 3 měsíci +1

    Great work as usual, clever bugger 🤣

  • @mariemccann5895
    @mariemccann5895 Před 3 měsíci +2

    Awesome work!

  • @mcbain2k
    @mcbain2k Před 3 měsíci +1

    Good job, well done.

  • @terryh8421
    @terryh8421 Před 3 měsíci +1

    Excellent post!

  • @hammer313
    @hammer313 Před 3 měsíci +1

    amazing. I wouldn't have thought it was possible until you did it. I learnt a lot. potentially using the number guessing algorithm sometimes taught in programming 101 classes might have been quicker. blank the top half of the area, if the pin is still set, it's in the bottom half, repeat with blanking half of the bottom half, repeat, repeat, my names on my feet, I'm pete, pete repeat,.

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci

      Thanks 👍Yes that approach may have been quicker! It looked like the config data started at 0350 in the EEPROM so blanking the top half, and then the bottom half of that block might have narrowed it down quicker.

  • @599miata
    @599miata Před 3 měsíci +1

    By the looks of it, you had great fun there, mate.😊😊

  • @mitchellhw2006
    @mitchellhw2006 Před 3 měsíci +1

    I have an embedded controller from a correctional facility door control panel that one of the techs bricked the IP address. Hoping the flash memory chip I spotted on the board holds the IP address.... Great video. Makes me want to give it a try.

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci

      Thanks 👍Worth a try, what's the worst that can happen it's bricked anyway? Alternatively if that didn't work and you have another unit you could always read that chip from that one and use the data to re-program the other one.

  • @bones1225
    @bones1225 Před 3 měsíci +1

    Loads of fun.Thanks

  • @jamieblatantsparky
    @jamieblatantsparky Před 3 měsíci +1

    Proper hooked me in this video in to trying to things have not done before

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci

      Nice, nothing to loose by trying and you'll gain experience if nothing else 👍

    • @jamieblatantsparky
      @jamieblatantsparky Před 3 měsíci +1

      Oh I’ll be buying a reader for sure great content

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci

      Thank you 👍

  • @johnpartridge7623
    @johnpartridge7623 Před 3 měsíci +1

    Good job mate, way above my pay grade but it was still good to learn something new 👍

  • @fastfourier666
    @fastfourier666 Před 3 měsíci +6

    Good video, thanks! I think you mentioned it briefly but if you are going to be pulling the EEPROM off the board repeatedly it's worth soldering a switch to the processor's reset line and some flying leads to the programmer. USually only need GND, SCL and SDA. Processor in reset typically puts all its pins in a high impedance state, allowing you to read/write the EEPROM from the programmer

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci

      Thanks, yes I had considered it but I'm pretty used to taking chips off and on now. I've not had much success in the past with EEPROMS in circuit, but thank you for the suggestion 👍

    • @renakunisaki
      @renakunisaki Před 3 měsíci +1

      Or replace the chip with a socket.

  • @marklatimer7333
    @marklatimer7333 Před 3 měsíci +1

    You've got a lot more patience than I would have taking that chip on and off so many times, not to mention potential PCB damage.
    I noticed what looks like two serial resistors on the data line between the CPU and the EEPROM, these are usually fitted so you can back drive the EEPROM when the CPU is off, I would suspect that the EEPROM can be programmed in-situ via the header just below it.

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci

      Yes, I noticed them too when I was editing the video, but sometimes it's a lot easier to spot things when watching the video back than when you are actually working on something. The header is for the display, but it seems the i2c lines go there to drive the display too.

  • @salehsalehi8955
    @salehsalehi8955 Před 3 měsíci +2

    Loved it ..Thanks

  • @Shandleyman
    @Shandleyman Před 3 měsíci +1

    Well done! Right up my future alley. :)

  • @roneckler9937
    @roneckler9937 Před 3 měsíci +2

    In a way, it goes to show people that their data really isn't as secure as they think, although, you do have to have some knowledge in doing what you do. I don't have a chip reader, but if I did, the chip would have probably started playing a tune by time I got done with it. It's been a long time since I played with HEX or Binary codes. Once again, you never disappoint in your videos.

  • @frankcarpenetti5776
    @frankcarpenetti5776 Před 3 měsíci +1

    Wow. Amazing work Bro!

  • @Pulverrostmannen
    @Pulverrostmannen Před 3 měsíci +1

    really impressive work my dude

  • @Gr3mI1n
    @Gr3mI1n Před 3 měsíci +2

    Not gonna lie, this looks fun! :D

  • @alexl5915
    @alexl5915 Před 3 měsíci +1

    That was awesome! Thanks!

  • @paulmuff9883
    @paulmuff9883 Před 3 měsíci +3

    Yee Gods man you’re so clever I’m in ore 👍👍👍😀

  • @mitumkallidin3464
    @mitumkallidin3464 Před 3 měsíci +1

    On a AUTEL IM608 key programmer, we read an eeprom and dump the file on the Immo side of the machine, the pin code comes up on the bottom corner. Makes key programming easy with the pincode👌

  • @NicksStuff
    @NicksStuff Před 3 měsíci +2

    Brilliant!

  • @richbwarner
    @richbwarner Před 3 měsíci +4

    That would be a deep sea controller from a ex aggreko machine, all the PIN codes were set as 2000, in the config suite using the p810 connector all the values can be edited.

  • @EbikeRepairs
    @EbikeRepairs Před 3 měsíci +1

    Great video as always!

  • @axelbrendel4091
    @axelbrendel4091 Před 3 měsíci +1

    Great sleuthing! What always amazes me is how much heat (and thermal cycles) those SMD chips can take! I'd be worried about destroying it after only one or two removals.

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci

      Thanks 👍I don't think I've managed to kill a chip yet due to removing / refitting.

    • @renakunisaki
      @renakunisaki Před 3 měsíci

      I'd be worried about how many pins are left after a few cycles 😂

  • @zombieryder
    @zombieryder Před 3 měsíci +3

    Very clever

  • @suryavanshib
    @suryavanshib Před 3 měsíci +1

    Awesome 😎😎😎
    You nailed it🤩🤩🤩
    Keep it up 💪🏻💪🏻💪🏻

  • @mauanderuk
    @mauanderuk Před 3 měsíci +1

    Nice deduction

  • @joejane9977
    @joejane9977 Před 3 měsíci +1

    thank you

  • @chrissmith7655
    @chrissmith7655 Před 3 měsíci +2

    Hi, enjoyed??? dam amazing!!!! Many thanks from Nr Chester.

  • @maxvideodrome4215
    @maxvideodrome4215 Před 3 měsíci +1

    I have an old 286 PC with no manual available. Same method here with EPROM .. hardcoded HDD types (cylinders/heads/sectors). Took a lot of work but reverse engineered it!

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci

      Very nice! Thanks for sharing 👍

  • @e42_channel
    @e42_channel Před 3 měsíci +1

    Great video - as always. Two more comments from me: The SOIC clip is a bit risky because parts or the whole circuit containing the serial EPROM is powered by the programmer during read/write which could lead to overload. But I think you have this in mind.
    Another option would be to use a logic analyzer (Salea cheap ones) to record the I2C bus for reengineering.

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci +1

      Thanks 👍Yes that was my thoughts, so it was easier to just remove the chip. I've tried programming them in circuit before (I think it was a Landrover ECU that needed the immobiliser removed) and just ended up removing the chip as I couldn't get it to program in circuit. I had thought about using my LA. I've got one and used it when I was reverse engineering the Milwaukee battery protocol over on Reddit about 9 months ago. I had been thinking about waiting to enter the pin and seeing what addresses it read from the EEProm but because it seemed it was constantly writing logs because of the missing sensors I didn't bother. Thanks again for commenting 🙂

    • @mrfrenzy.
      @mrfrenzy. Před 3 měsíci

      The danger with using the clip is usually if the MCU powers up and sets the write flag for some reason, which leads you to corrupt data that you need. As long as you have a good dump from the same unit it's not very scary. For some units you can solve it by jumping the reset pin on the MCU so it does not start, also some nice programmers can keep the voltage low enough so the MCU does not start but the EEPROM does.

    • @e42_channel
      @e42_channel Před 3 měsíci

      @@mrfrenzy. You are right. But in this case it is an i2c EEPROM and all transfers are handled by the bus protocol. And the write protection (WP, pin7) is tied to ground and not switchable, as you can see at 3:25.

  • @AubsUK
    @AubsUK Před 3 měsíci +1

    At 15:18 thank you for showing the 'Programmer' option on the calculator. You've no idea how many times I've used a website converter (because I'm lazy) to convert Hex to Dec. Now I have it on my calculator. And I'm an advanced computer/server tech, but never realised it was that simple! I feel like an idiot right now.

    • @AubsUK
      @AubsUK Před 3 měsíci +1

      Great video too, thanks for continuing to share :-)

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci

      You're very welcome 👍

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci +1

      Everyday is a school day 👍I'm glad you got something useful from it 🙂

  • @DemetryRomanowski
    @DemetryRomanowski Před 3 měsíci +2

    If anyone is interested this is pretty much exactly how we OEM engine ecm tuners do our thing, simply put read the eeprom, mess with values on a bench see what changes then create a "map" file for the data, that way we know what bytes to change to change the tuning of the engine in the same vehicle. Gets much trickier with modern vehicles now though, nasty checksums and data signing.

    • @kurdm1482
      @kurdm1482 Před 3 měsíci +1

      This guy didn't share how he figured out the values efficiently.
      He definitely skipped a part.
      But still good video

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci +2

      Yes signing and CRC's can be tricky. Sometimes it's easier to get rid of the checks in the code 🙂👍

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci +1

      Thanks 👍The values were just converted from hex to decimal with the calculator. I showed the values on the screen. If you open calculator on windows and change it to programmer mode you can select hex and enter one of the hex values and it will show it in decimal.

  • @tiggydorset9041
    @tiggydorset9041 Před 3 měsíci +2

    Quality stuff. Thanks for the education. I thought you were just playing around just for kicks when changing the other values, but then you gave a legitimate reason why someone would actually want to change them. Nice work.

    • @BuyitFixit
      @BuyitFixit  Před 3 měsíci +1

      Thanks 👍Yes, that's a legitimate use case, but as with anything, there are also some not so legitimate use cases too..

  • @dragonlard4595
    @dragonlard4595 Před 3 měsíci +1

    Nice...Thats the Spirit. :)

  • @retsof
    @retsof Před 3 měsíci +1

    Great stuff man 💪

  • @ion3lm588
    @ion3lm588 Před 3 měsíci +1

    i have no ideea what is happening there 😁 i do instead watch Louis Rossman videos but only cos i really believe in right to repair,obviously not by me...very enjoyable thump up 👍

  • @vintopin
    @vintopin Před 3 měsíci +2

    This is the way to do it :)

  • @chris-mm6oh
    @chris-mm6oh Před 3 měsíci +1

    Fantastic 😊