From Collaborative RCE Tool Library

Jump to: navigation, search

Dongle Emulation Tools


Tool name: DongleKnack
Rating: 5.0 (1 vote)
Author: H. Haftmann                        
Website: http://www-user.tu-chemnitz.de/~heha/
Current version: 2.00
Last updated:
Direct D/L link: Locally archived copy
License type: Freeware & Source (TASM, Pascal)
Description: This tools logs all traffic on the parallel port on ring 0 level by using a dynamic VxD.
Thus it works on all Win9x related Windows (Win3x, Win9x and Win2K).

The dynamic VxD either modifies the IOPM (IO Permission Map) or traps the port by setting a Debug Register on its address. To use the Debug Register method you need at least a Pentium processor.
If you have logged all port traffic, you can replay the log file port traffic and thus emulate the Dongle.
The log file is not compressed and it can be used to understand the dongle routines in the application you want to crack.

Be sure you check the source if you're interessted in Win9x system programming.
Also listed in: Dongle Dumper Tools, Parallel Comm Monitoring Tools
More details: Click here for more details, screenshots, related URLs & comments for this tool! (or to update its entry)



Tool name: WibuEmu
Rating: 5.0 (1 vote)
Author: Sab, deepzone & xor37h                        
Website: N/A
Current version:
Last updated: June 29, 2008
Direct D/L link: Locally archived copy
License type: Free / Open Source
Description: 1. Run wkdumpers for cipher text.
2. Place into gk_feal.c in knCipher array.
3. Solve the key (it should say ok passed).
4. Place solved ciphertext into bruteforce solver. (could take up to 4 days).
5. Place brutesolver values into emulator.
6. Any decent coder can take this source and make it really nice and friendly. I hope some of the hasp guys on this forum update it for mass use.

Note: I suggest using test vectors already existing in sources. The .h file has them. Formz dumpdng. has sample vectors for gk_feal.c first for steps 1-5 to make sure you do it correctly. This code is borland, but easily ports. Source is old as dirt but too lazy to give you all the newer cleaner stuff. Have fun.

Code can be optimized plenty, especially the solver (we already did but you can do it for fun).

Newer wibus can be solved to with the extra 0xFF keysize. Thats for you guys to figure out.
Also listed in: Dongle Crypto Solver Tools, Wibu Dongle Tools
More details: Click here for more details, screenshots, related URLs & comments for this tool! (or to update its entry)


RSS feed Feed containing all updates and additions for this category.

RSS feed Feed containing all updates and additions for this category, including sub-categories.





Views
Category Navigation Tree
   Code Coverage Tools  (13)
   Code Ripping Tools  (2)
   Helper Tools  (3)
   Hex Editors  (13)
   Memory Patchers  (7)
   Packers  (20)
   Profiler Tools  (11)
   String Finders  (10)
   Tool Hiding Tools  (7)
   Tracers  (22)
   Needs New Category  (3)