Results 1 to 9 of 9

Thread: Hardlock Memory Dumper

  1. #1
    cyco2
    Guest

    Hardlock Memory Dumper

    hey ppl... a while ago I asked something on the forum, well some ppl at this forum started to bitch.
    Anyway I don't care, and I WANT to help ppl in stead of bitching all day.

    Here is one of my first tests... I will come back with a more advanced one.

    This is only for testing... if you got a hardlock dongle at your home, pls test this.

    btw, a brute forcer is also coming for module addresses. I found a way to do this in less then 3 hours.

    All are programmed on the low level api.

    Also I found a secret undocument API which covers the verify key calculation.

    my final will be WITH source code ..... I hope ppl will like it.

    Goofy...
    Attached Files Attached Files
    I promise that I have read the FAQ and tried to use the Search to answer my question.

  2. #2
    Programmer Run Amock... Bengaly's Avatar
    Join Date
    Aug 2001
    Location
    Somewhere over the Rainbow
    Posts
    289
    Blog Entries
    1
    who who
    go get them =)
    and puke on all bitchers :-)
    "knowledge is now free at last, everything should be free from now on, enjoy knowledge and life and never work for everybody else"

  3. #3
    Hiya,

    I don't know what you used to brute force the MOD_AD, but 3hrs seems awful slow to me ;-), I managed it in around 20 minutes with just the ASM sample they provide in the SDK.

    Anything wrong with testapi.exe for the rest?.

    Regards

    CrackZ.

  4. #4
    cyco2
    Guest

    Smile

    well ur right... crackz... testapi will do it. But why is there a API_FUNCTION (dec 30) which is undocumented where ya can create a verify key with?... I mean I could not find it in any doc / source of them.

    Second I did not optimize it yet, to set flags like don't search for USB auto and crap... the slowness of the bruteforce atm is the LowLevel api... not my code. And btw their High Level ASM example is ... well not very pretty right ?

    I will optimize the bruteforces also in ASM, so maybe I will all together get more and better results. And then again I'm talking about bf'ing the whole range (1 to 8192*8), often the Dongle has a module address between 26000 and 35000 (I got 5 different dongles here).

    But you are right crackz... I hoped only I could help some ppl out since there are no such tools available... maybe u even want to host the tool when it is ready?

    /me wrote a very easy to use CHardlockDongle Object, which can encrypt/decrypt (KEYE) unlimited count of bytes.... (not the 64k limit like the HL API got). it will be with the source

    Let me know if ya interested, and if you know things about Hardlock you think I should know by making this tool... please tell me

    thanx for responding...

    Goofy...
    I promise that I have read the FAQ and tried to use the Search to answer my question.

  5. #5
    tgodd
    Guest
    You should be able to do it in a few minutes.

    Regards,
    TGODD
    I promise that I have read the FAQ and tried to use the Search to answer my question.

  6. #6
    tgodd
    Guest
    Just a small hint.

    There are only 8160 (decimal) possibilities.



    Regards,

    TGODD
    I promise that I have read the FAQ and tried to use the Search to answer my question.

  7. #7
    cyco2
    Guest

    Thumbs up

    Thanx for the info... though how ya know only that small range will cover all the module addresses? And what is the range exacly, I'll put it in my program, with the help of all ya ppl I can make as best working program possible.

    Anyway let me know what kind of features you think would be handy if ya have to deal with a hardlock dongle?

    Goofy...
    I promise that I have read the FAQ and tried to use the Search to answer my question.

  8. #8

    mm.. foooood.

    Hi cyco nice upload. Needs work of course but im sure ppl will find it quite nice to try. Maybe it might be a nudge for others to start uploading similar findings on the same dongle or perhaps different ones(: Whether they are discovered already or not. Keep on Keep'n on (: -Sab

  9. #9
    marcos135
    Guest

    I find a way to view module address just a few second.....

    Here is my test for my hardlock usb dongle....
    excecute the file in dos mode and run "dongle/test "argument
    and it will show the module address automatically....
    Attached Files Attached Files
    I promise that I have read the FAQ and tried to use the Search to answer my question.

Similar Threads

  1. MSIL Dumper
    By Kurapica in forum Tools of Our Trade (TOT) Messageboard
    Replies: 4
    Last Post: December 29th, 2008, 19:05
  2. Imm_OllyDbg PE Dumper 3.03/OllyDbg PE Dumper 3.03
    By JMI in forum Plugins (General)
    Replies: 3
    Last Post: July 21st, 2008, 12:37
  3. Replies: 2
    Last Post: April 7th, 2008, 00:00
  4. HASP Dumper and Emulator
    By asifpervez in forum The Newbie Forum
    Replies: 3
    Last Post: April 6th, 2007, 12:10
  5. Process Memory Dumper V1.0
    By lovelace in forum Tools of Our Trade (TOT) Messageboard
    Replies: 1
    Last Post: October 5th, 2005, 23:45

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •