Reverse Engineering Team Board

Reverse Engineering Team Board (http://www.reteam.org/board/index.php)
-   General Forum (http://www.reteam.org/board/forumdisplay.php?f=21)
-   -   Sentinel 8.1.1 (http://www.reteam.org/board/showthread.php?t=2714)

jarm 06-26-2010 08:27 PM

Sentinel 8.1.1
 
the reason for this thread is acutally to pick a brain or 2 to see if i can get this software running.
I have this software. its protected using sentinel 8.1.1 rms.
i have a key to activate the licencing software and its still good till october. I just cant use it cause the licence request file listed a different ethernet mac as the host machine. Is there anyway to bypass this. Spoofing the mac id doesn't work.
Ill include a copy of the licence file, and a copy of the licence request file generated on the new pc.

Now ive been reading a little about this on this site and i know theres a couple gurus here that can decode these keys. Im curious as to the purpose for decoding them. I assume this is to recover information needed to create new keys.These tools needed to do this, i believe would be the 8.1 sdk of the rms, which is apparently really hard to get. Ive read a little over on the crackz site but all the sdks are locked up tight (not that any would work for me). I guess what im saying is this is going to be really impossible for me without some help. Wether it be a little guidance or some software or a link. I would really appreciate it.

BfoX 06-27-2010 12:49 AM

as sample:

* Feature name : ArcWeld_PowerPac
* Feature vers : 5.12
* Vendor ID : 17386
* Num Secrets : 7
* Secrets[1..7] : skipped...
* Vendor info :

jarm 06-27-2010 06:24 PM

I really am thankful for the vendor id, but I have come to realalize these keys are not even encrypted, how did you pull the vid from them. All the software ive found that produces the vid, required the encrypted keys. I'm just wondering. Thanks

calvin 06-28-2010 09:34 AM

setting a correct BP in lsdecode will give you all the hidden info :)

robin1044 06-28-2010 10:51 PM

@Jarm : ready to use solution is for fresh crackers, you better try to find the right point by yourself.
Hint: just use 'lservrc' filled with license with known VID and after decoding look for VID, then set hardware-bp on write and restart olly. you will find right position for VID (which ofcourse differs from one version of lsdecode to the other - SO YOU ARE AN STEP AHEAD :)


All times are GMT -4. The time now is 03:31 AM.

Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2020, Jelsoft Enterprises Ltd.