Reversing Seeds from Hardlock Key possible
+5
mfav
mindoverflow
uc
BfoX
Lomex
9 posters
Page 2 of 3
Page 2 of 3 • 1, 2, 3
Re: Reversing Seeds from Hardlock Key possible
This set is not working. Maybe I should check all 55?
uc- Posts : 8
Points : 8
Reputation : 0
Join date : 2013-07-28
Re: Reversing Seeds from Hardlock Key possible
I entered seeds you provided to, and the program didn't start - no key. When I modify program to replace ref key and ver key with 00 it starts.
uc- Posts : 8
Points : 8
Reputation : 0
Join date : 2013-07-28
Re: Reversing Seeds from Hardlock Key possible
This works. Confirmed also with Latticino, login successfull!!!
uc- Posts : 8
Points : 8
Reputation : 0
Join date : 2013-07-28
Re: Reversing Seeds from Hardlock Key possible
Can I assume with this seeds the HL_CODE will also work correctly? or it is not obvious.
uc- Posts : 8
Points : 8
Reputation : 0
Join date : 2013-07-28
Re: Reversing Seeds from Hardlock Key possible
Exists about 50 another correct seeds for ref/ver, but only one from them will be correct for hl_code.
Re: Reversing Seeds from Hardlock Key possible
OK, I understand. If I find coded data to confirm I will let you know. Thank you for your help!!!!
uc- Posts : 8
Points : 8
Reputation : 0
Join date : 2013-07-28
Re: Reversing Seeds from Hardlock Key possible
nodongle.biz wrote:I have such tool.
Post here ref/ver bytes.
Hi,
I would like if you could check the seeds for a hardlock dongle. Those are supposed to be the Ref and VerKeys of the same dongle. I found those seeds 2A3B 30FC CE96 but HL_Code isn't computing right then I'm still in doubt.
- Code:
ModAd = 63A9
static BYTE RefKey[8] = {0x43, 0x68, 0x21, 0x6E, 0x40, 0x7E, 0xB0, 0xDF}; static BYTE VerKey[8] = {0x38, 0xE8, 0xF2, 0xA5, 0xD4, 0x02, 0xE9, 0xBC};
static BYTE RefKey[8] = {0x7E, 0x45, 0x2C, 0x35, 0x51, 0x35, 0x3A, 0x29}; static BYTE VerKey[8] = {0x7F, 0x52, 0xB1, 0x7D, 0x0D, 0x35, 0x10, 0xDC};
static BYTE RefKey[8] = {0x58, 0x46, 0x2F, 0x31, 0x39, 0x3E, 0x31, 0x61}; static BYTE VerKey[8] = {0x08, 0xE5, 0x6E, 0x7C, 0xB3, 0x9D, 0xB1, 0x1C};
static BYTE RefKey[8] = {0x33, 0x3C, 0x37, 0x6F, 0x36, 0x37, 0x4F, 0x6E}; static BYTE VerKey[8] = {0x67, 0xF8, 0x98, 0x61, 0xD9, 0xD0, 0xA0, 0x0D};
static BYTE RefKey[8] = {0x21, 0x46, 0x31, 0x65, 0x38, 0x44, 0x39, 0x34}; static BYTE VerKey[8] = {0x9E, 0xD1, 0xC9, 0x3C, 0xA6, 0xEF, 0xAD, 0xDC};
static BYTE RefKey[8] = {0x43, 0x62, 0x49, 0x32, 0x24, 0x25, 0x39, 0x42}; static BYTE VerKey[8] = {0xFA, 0xCC, 0xA1, 0xD6, 0x67, 0xBA, 0x0C, 0x0D};
static BYTE RefKey[8] = {0x33, 0x3C, 0x37, 0x6F, 0x36, 0x37, 0x4F, 0x6E}; static BYTE VerKey[8] = {0x67, 0xF8, 0x98, 0x61, 0xD9, 0xD0, 0xA0, 0x0D};
and if you could do me a favour and calculate the seeds for this hardlock then it would be great.
- Code:
ModAd = 6898
static BYTE RefKey[8] = [0x00, 0x35, 0x85, 0x12, 0x86, 0x52, 0x59, 0x89}; static BYTE VerKey[8] = {0xD8, 0xC7, 0xFA, 0x72, 0x14, 0x27, 0xFC, 0xC6};
static BYTE RefKey[8] = {0x48, 0x33, 0x64, 0x31, 0x67, 0x37, 0x74, 0x36}; static BYTE VerKey[8] = {0x6F, 0xBB, 0x0A, 0xF6, 0xD6, 0x88, 0xB2, 0xFD};
I still can't find hl_seed.c I would be gratefull if someone could point me to it.
Many thanks.
mindoverflow- Posts : 5
Points : 5
Reputation : 0
Join date : 2013-07-31
Re: Reversing Seeds from Hardlock Key possible
Ok, thanks mate.
But i'm still not getting it to function right, I wounder why.
To clarify the situation, I took the dump from a toro hardlock emulator. I know that toro went tricky to prevent dumping from the emulator. I still can't see a way to bypass it.
1_ I didn't succeed in decrypting the hardlockfilter.sys to debug it.
2_Don't see how the hl_code dumping algorithm works (i'm using the public version)
3_Didn't find the hl_seed or the algorithm to calculate the seeds from the ref/ver key.
I would appreciate if someone could enlighten me more.
thanks.
But i'm still not getting it to function right, I wounder why.
To clarify the situation, I took the dump from a toro hardlock emulator. I know that toro went tricky to prevent dumping from the emulator. I still can't see a way to bypass it.
1_ I didn't succeed in decrypting the hardlockfilter.sys to debug it.
2_Don't see how the hl_code dumping algorithm works (i'm using the public version)
3_Didn't find the hl_seed or the algorithm to calculate the seeds from the ref/ver key.
I would appreciate if someone could enlighten me more.
thanks.
mindoverflow- Posts : 5
Points : 5
Reputation : 0
Join date : 2013-07-31
Re: Reversing Seeds from Hardlock Key possible
Thanks, I'll check.
Any idea about the other issues?
Any idea about the other issues?
mindoverflow- Posts : 5
Points : 5
Reputation : 0
Join date : 2013-07-31
Re: Reversing Seeds from Hardlock Key possible
To Bfox & Lomex
I'm in similar situation
got an old dos app protected with hardlock, it works in win xp, also I'm able to log its login\ref\verif data, would any of you guy kindly post that source from SaPu here, so other members can benefit; I did tons of googling with no success
I'm in similar situation
got an old dos app protected with hardlock, it works in win xp, also I'm able to log its login\ref\verif data, would any of you guy kindly post that source
mfav- Posts : 3
Points : 5
Reputation : 0
Join date : 2013-08-02
Re: Reversing Seeds from Hardlock Key possible
nodongle.biz wrote:There is no issues under correct emulators.
What do you mean by good emulator ? Toro's emulator works fine and multikey works great when given the correct emulation data. The problem lays in dumping from the toro emulator.
Any hint ? Or am I wrong somewhere ?
mindoverflow- Posts : 5
Points : 5
Reputation : 0
Join date : 2013-07-31
Re: Reversing Seeds from Hardlock Key possible
Seems Stoll M1 software can detect TORO and Multikey emulators.
Re: Reversing Seeds from Hardlock Key possible
I doubt, as it was released before toro and mk went wide spread, unless it was fixed in the later builds. But toro's emulator works fine that leads me to think that the problem is in the dumping process from a toro emulator.
Did anyone succeed in taking a dump from a toro emulated dongle ?
And yet, the software works fine, loads, draws and generate correct programs but if you employ the narrowing feature (ff) the program crashes. It's not that the program doesn't work at all.
Did anyone succeed in taking a dump from a toro emulated dongle ?
And yet, the software works fine, loads, draws and generate correct programs but if you employ the narrowing feature (ff) the program crashes. It's not that the program doesn't work at all.
mindoverflow- Posts : 5
Points : 5
Reputation : 0
Join date : 2013-07-31
62FE
i need seeds please any one to help.
- Spoiler:
- Hardlock In:> HLM_LOGIN: ModAd=25342 (0x62FE),
RefKey=Dongel95, 446F6E67656C3935
VerKey=ÆÿNEÒ±ù, 08C6FF4E45D2B1F9
Hardlock Out:> HLM_LOGIN: ModAd=25342 (0x62FE) -> Status=No device available
Hardlock In:> HLM_LOGIN: ModAd=25342 (0x62FE),
RefKey=Dongel95, 446F6E67656C3935
VerKey=ÆÿNEÒ±ù, 08C6FF4E45D2B1F9
Hardlock Out:> HLM_LOGIN: ModAd=25342 (0x62FE) -> Status=No device available
Hardlock In:> HLM_LOGIN: ModAd=25342 (0x62FE),
RefKey=Dongel95, 446F6E67656C3935
VerKey=ÆÿNEÒ±ù, 08C6FF4E45D2B1F9
Hardlock Out:> HLM_LOGIN: ModAd=25342 (0x62FE) -> Status=No device available
Hardlock In:> HLM_LOGIN: ModAd=25342 (0x62FE),
RefKey=Dongel95, 446F6E67656C3935
VerKey=ÆÿNEÒ±ù, 08C6FF4E45D2B1F9
Hardlock Out:> HLM_LOGIN: ModAd=25342 (0x62FE) -> Status=No device available
Hardlock In:> HLM_LOGIN: ModAd=25342 (0x62FE),
RefKey=Dongel95, 446F6E67656C3935
VerKey={Ã6|µ ï, 7BC3367CB509EF1C
Hardlock Out:> HLM_LOGIN: ModAd=25342 (0x62FE) -> Status=No device available
Hardlock In:> HLM_LOGIN: ModAd=25342 (0x62FE),
RefKey=Dongel95, 446F6E67656C3935
VerKey={Ã6|µ ï, 7BC3367CB509EF1C
Hardlock Out:> HLM_LOGIN: ModAd=25342 (0x62FE) -> Status=No device available
Hardlock In:> HLM_LOGIN: ModAd=25342 (0x62FE),
RefKey=Dongel95, 446F6E67656C3935
VerKey={Ã6|µ ï, 7BC3367CB509EF1C
Hardlock Out:> HLM_LOGIN: ModAd=25342 (0x62FE) -> Status=No device available
Hardlock In:> HLM_LOGIN: ModAd=25342 (0x62FE),
RefKey=Dongel95, 446F6E67656C3935
VerKey={Ã6|µ ï, 7BC3367CB509EF1C
Hardlock Out:> HLM_LOGIN: ModAd=25342 (0x62FE)
kjms- Posts : 194
Points : 201
Reputation : -4
Join date : 2010-09-12
Re: Reversing Seeds from Hardlock Key possible
nodongle.biz thanks thanks, please how could get seed3 ?nodongle.biz wrote:5633
86AD
seed3 is different
kjms- Posts : 194
Points : 201
Reputation : -4
Join date : 2010-09-12
Re: Reversing Seeds from Hardlock Key possible
*************deleted *************
Last edited by hasp on Sun Nov 24, 2013 9:31 am; edited 1 time in total (Reason for editing : wrong info)
hasp- Posts : 454
Points : 634
Reputation : 172
Join date : 2011-12-16
Re: Reversing Seeds from Hardlock Key possible
this is not my opp... some where xxxx posted! if wrong i edit my post.
Last edited by hasp on Sun Nov 24, 2013 9:30 am; edited 1 time in total (Reason for editing : refer)
hasp- Posts : 454
Points : 634
Reputation : 172
Join date : 2011-12-16
Page 2 of 3 • 1, 2, 3
Similar topics
» Reversing reg to DMP (reg editing)
» Sentinel SuperPro Reversing [HELP PLEASE !]
» Hardlock E-Y-E seeds
» Seeds-recovering-by-Olly-debugger
» Sentinel SuperPro Reversing [HELP PLEASE !]
» Hardlock E-Y-E seeds
» Seeds-recovering-by-Olly-debugger
Page 2 of 3
Permissions in this forum:
You cannot reply to topics in this forum
|
|