↓ Advertise on Defender2 ↓

Home > Off Topic > ..
Post Reply  Down to end
Page 1 of 1
Print this entire topic · 
diesel_jim



Member Since: 13 Oct 2008
Location: hiding
Posts: 6092

United Kingdom 2006 Defender 110 Td5 SW Epsom Green
..
..

Last edited by diesel_jim on 13th Apr 2015 7:45pm. Edited 1 time in total
Post #293120 25th Dec 2013 3:44pm
View user's profile Send private message View poster's gallery Reply with quote
davew



Member Since: 02 Jan 2012
Location: North Yorkshire
Posts: 888

England 1990 Defender 90 V8 Petrol PU Auto Rioja Red
How simple it is to "emulate" will depend on the way the software has been encrypted against it. There are a whole host of ways of implementing dongle security with the HASP dongles and normally how it's been done comes down to how keen the developer is to make it secure.

If it's a simple implementation where the software simple looks for the dongle's existence to work then emulating it is possible although not trivial.

If it's been done in a better way, the dongle will contain encrypted information necessary for the software to run, either snippets of code that need to be loaded into memory from the dongle or variable values without which the software fails to run correctly.

You cannot clone one HASP to another, they are each manufactured for a specific developer and have a unique embedded challenge key so unless the HASP you want to copy to is from the same developer you've no chance. http://www.yorkshireoffroadclub.net/
Post #293122 25th Dec 2013 4:47pm
View user's profile Send private message View poster's gallery Reply with quote
diesel_jim



Member Since: 13 Oct 2008
Location: hiding
Posts: 6092

United Kingdom 2006 Defender 110 Td5 SW Epsom Green
Crikey, i never realied they were that intricate. Thanks for the info though.

Don't suppose you know how to tell what the sec level is of them? is there any good software you know of that will tell this?
Post #293123 25th Dec 2013 4:50pm
View user's profile Send private message View poster's gallery Reply with quote
walfy



Member Since: 29 Aug 2007
Location: Frome
Posts: 2658

 
Big Cry Big Cry Big Cry Big Cry 110 D250 SE HT
110 USW SOLD
RRE HSE Dynamic Gone, wife killed it
VOLVO XC60 R Dynamic with some toys

Polaris RZR 900XP SOLD
Post #293129 25th Dec 2013 6:02pm
View user's profile Send private message View poster's gallery Reply with quote
diesel_jim



Member Since: 13 Oct 2008
Location: hiding
Posts: 6092

United Kingdom 2006 Defender 110 Td5 SW Epsom Green
I've done some more googling and downloaded various bits of software. Got something churning away in the background at the moment... it's either decyphering the dongle that's plugged in, or just an app to make my laptop fans run flat out... eitehr way it's working hard!


davew wrote:
want to copy to is from the same developer you've no chance.


Yes, the "spare" dongle is from the same source... same manufacturer and user, just with a different code number written on it... although as to what's inside is anyones guess. Shocked


walfy wrote:
Big Cry Big Cry Big Cry Big Cry


Don't fret young Padawan; We'll get it cracked!
Post #293135 25th Dec 2013 6:55pm
View user's profile Send private message View poster's gallery Reply with quote
walfy



Member Since: 29 Aug 2007
Location: Frome
Posts: 2658

 
Bow down Bow down Bow down

Do I need to bring another bottle of bubbles round??? 110 D250 SE HT
110 USW SOLD
RRE HSE Dynamic Gone, wife killed it
VOLVO XC60 R Dynamic with some toys

Polaris RZR 900XP SOLD
Post #293142 25th Dec 2013 7:31pm
View user's profile Send private message View poster's gallery Reply with quote
davew



Member Since: 02 Jan 2012
Location: North Yorkshire
Posts: 888

England 1990 Defender 90 V8 Petrol PU Auto Rioja Red
diesel_jim wrote:
Crikey, i never realied they were that intricate. Thanks for the info though.

Don't suppose you know how to tell what the sec level is of them? is there any good software you know of that will tell this?


I'm not aware of any software that will universally interrogate a HASP key and determine what it does. One of the strengths of the system is that only the developer knows what is being used and what isn't being used. It may be that you could, with time, use a brute force attack to obtain the keys that the HASP uses but there is a risk that this will use up the available internal "counter" or read/write cycles rendering the HASP inoperable. They are far more than a simple device, they have an on board ASIC that provides a number of functions including protected memory areas and encryption/decryption using pre-shared keys.

Bear in mind that the people who would write that kind of "cracking" software and publish it on the internet are the same people that write trojans, key loggers and other methods of gathering data from your PC. I wouldn't run it on anything other than a completely isolated environment that I then destroyed afterwards...

With a good knowledge of software development and assembly instructions/machine code the protected software can have a monitor/debugger attached to it and the exchanges between the HASP SDK and the software monitored to determine what level of protection is being used. It's a long drawn out task though, there are no "short cuts" although if it's commonly used software there may be a specific crack for it from someone that has already done the hard graft. Microcat, for example, had a freely available emulator that someone had created. http://www.yorkshireoffroadclub.net/
Post #293175 25th Dec 2013 11:58pm
View user's profile Send private message View poster's gallery Post Reply
Post Reply  Back to top
Page 1 of 1
All times are GMT

Jump to  
Previous Topic | Next Topic >
Posting Rules
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum



Site Copyright © 2006-2024 Futuranet Ltd & Martin Lewis
DEFENDER2.NET RSS Feed - All Forums