Read the first paragraphs in my write-up here:
https://github.com/bri3d/simos18_sbootKeep in mind that the SBOOT itself in MEG17.9.12 is
completely different from the Simos one in my writeup, but the
concept is the same. If you can't understand concepts, you will struggle with this.
The analog frequencies are not an "exploit," they are just a signal to tell the ECU to stop at the supplier bootloader instead of continuing to CBOOT. Also, being able to upload your own bootstrap loader is not an "exploit," it's just a standard feature in Tricore.
You are trying to bypass an internal protection: when you enter the hardware bootstrap loader by manipulating the HWCFG/"boot" pin configuration, the Tricore Boot ROM locks the internal Flash controller using passwords. These passwords are just arbitrary values which are set when the ECU is provisioned. They are stored in "user configuration blocks" inside the Flash. You can read all about this in the Tricore user's manual, which you need to read if you are going to do this kind of work on Tricore.
The actual
exploit is in the supplier bootloader and you will not find it without reversing the bootloader (or stealing it, but that's boring as hell).
Also,
No worries, I have a degree in computer science, this would be a piece of cake, I just need to catch up with some knowledge and I need resources.
is easily the funniest thing I've read in years.