Dongle Emulation Tools -WibuEmu,1. Run wkdumpers for cipher text.2. Place into gk_feal.c in knCipher array.
3. Solve the key (it should say ok passed).
4. Place solved ciphertext into bruteforce solver. (could take up to 4 days).
5. Place brutesolver values into emulator.
6. Any decent coder can take this source and make it really nice and friendly. I hope some of the hasp
guys on this forum update it for mass use.
Note: I suggest using test vectors already existing in sources. The .h file has them. Formz dumpdng. has
sample vectors for gk_feal.c first for steps 1-5 to make sure you do it correctly. This code is borland, but
easily ports. Source is old as dirt but too lazy to give you all the newer cleaner stuff. Have fun.
Code can be optimized plenty, especially the solver (we already did but you can do it for fun).
Newer wibus can be solved to with the extra 0xFF keysize. Thats for you guys to figure out.