Home > Off Topic > .. |
|
|
diesel_jim Member Since: 13 Oct 2008 Location: hiding Posts: 6092 |
..
Last edited by diesel_jim on 13th Apr 2015 7:45pm. Edited 1 time in total |
||
25th Dec 2013 3:44pm |
|
davew Member Since: 02 Jan 2012 Location: North Yorkshire Posts: 888 |
How simple it is to "emulate" will depend on the way the software has been encrypted against it. There are a whole host of ways of implementing dongle security with the HASP dongles and normally how it's been done comes down to how keen the developer is to make it secure.
If it's a simple implementation where the software simple looks for the dongle's existence to work then emulating it is possible although not trivial. If it's been done in a better way, the dongle will contain encrypted information necessary for the software to run, either snippets of code that need to be loaded into memory from the dongle or variable values without which the software fails to run correctly. You cannot clone one HASP to another, they are each manufactured for a specific developer and have a unique embedded challenge key so unless the HASP you want to copy to is from the same developer you've no chance. http://www.yorkshireoffroadclub.net/ |
||
25th Dec 2013 4:47pm |
|
walfy Member Since: 29 Aug 2007 Location: Frome Posts: 2658 |
110 D250 SE HT
110 USW SOLD RRE HSE Dynamic Gone, wife killed it VOLVO XC60 R Dynamic with some toys Polaris RZR 900XP SOLD |
||
25th Dec 2013 6:02pm |
|
diesel_jim Member Since: 13 Oct 2008 Location: hiding Posts: 6092 |
I've done some more googling and downloaded various bits of software. Got something churning away in the background at the moment... it's either decyphering the dongle that's plugged in, or just an app to make my laptop fans run flat out... eitehr way it's working hard!
Yes, the "spare" dongle is from the same source... same manufacturer and user, just with a different code number written on it... although as to what's inside is anyones guess.
Don't fret young Padawan; We'll get it cracked! |
||
25th Dec 2013 6:55pm |
|
walfy Member Since: 29 Aug 2007 Location: Frome Posts: 2658 |
Do I need to bring another bottle of bubbles round??? 110 D250 SE HT 110 USW SOLD RRE HSE Dynamic Gone, wife killed it VOLVO XC60 R Dynamic with some toys Polaris RZR 900XP SOLD |
||
25th Dec 2013 7:31pm |
|
davew Member Since: 02 Jan 2012 Location: North Yorkshire Posts: 888 |
I'm not aware of any software that will universally interrogate a HASP key and determine what it does. One of the strengths of the system is that only the developer knows what is being used and what isn't being used. It may be that you could, with time, use a brute force attack to obtain the keys that the HASP uses but there is a risk that this will use up the available internal "counter" or read/write cycles rendering the HASP inoperable. They are far more than a simple device, they have an on board ASIC that provides a number of functions including protected memory areas and encryption/decryption using pre-shared keys. Bear in mind that the people who would write that kind of "cracking" software and publish it on the internet are the same people that write trojans, key loggers and other methods of gathering data from your PC. I wouldn't run it on anything other than a completely isolated environment that I then destroyed afterwards... With a good knowledge of software development and assembly instructions/machine code the protected software can have a monitor/debugger attached to it and the exchanges between the HASP SDK and the software monitored to determine what level of protection is being used. It's a long drawn out task though, there are no "short cuts" although if it's commonly used software there may be a specific crack for it from someone that has already done the hard graft. Microcat, for example, had a freely available emulator that someone had created. http://www.yorkshireoffroadclub.net/ |
||
25th Dec 2013 11:58pm |
|
|
All times are GMT |
< Previous Topic | Next Topic > |
Posting Rules
|
Site Copyright © 2006-2024 Futuranet Ltd & Martin Lewis