找回密码
 立即注册
theforPlaceEmulation | 程序非源代码 2021-05-17 374 0star收藏 版权: . 保留作者信息 . 禁止商业使用 . 禁止修改作品
Dongle Emulation Tools -WibuEmu,1. Run wkdumpers for cipher text.2. Place into gk_feal.c in knCipher array.
3. Solve the key (it should say ok passed).
4. Place solved ciphertext into bruteforce solver. (could take up to 4 days).
5. Place brutesolver values into emulator.
6. Any decent coder can take this source and make it really nice and friendly. I hope some of the hasp
guys on this forum update it for mass use.

Note: I suggest using test vectors already existing in sources. The .h file has them. Formz dumpdng. has
sample vectors for gk_feal.c first for steps 1-5 to make sure you do it correctly. This code is borland, but
easily ports. Source is old as dirt but too lazy to give you all the newer cleaner stuff. Have fun.

Code can be optimized plenty, especially the solver (we already did but you can do it for fun).

Newer wibus can be solved to with the extra 0xFF keysize. Thats for you guys to figure out.

1621218950647.rar



上一篇:CuteFTP 8.3 Build 08.07 Patch
下一篇:Create_EXE_Files_During_Runtime