Reverse Engineering RET Homepage RET Members Reverse Engineering Projects Reverse Engineering Papers Reversing Challenges Reverser Tools RET Re-Search Engine Reverse Engineering Forum Reverse Engineering Links

Go Back   Reverse Engineering Team Board > Reverse Engineering Board > General Forum
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Reply
 
Thread Tools Display Modes
  #1  
Old 06-26-2010, 08:27 PM
jarm jarm is offline
Member
 
Join Date: Aug 2009
Posts: 19
Default Sentinel 8.1.1

the reason for this thread is acutally to pick a brain or 2 to see if i can get this software running.
I have this software. its protected using sentinel 8.1.1 rms.
i have a key to activate the licencing software and its still good till october. I just cant use it cause the licence request file listed a different ethernet mac as the host machine. Is there anyway to bypass this. Spoofing the mac id doesn't work.
Ill include a copy of the licence file, and a copy of the licence request file generated on the new pc.

Now ive been reading a little about this on this site and i know theres a couple gurus here that can decode these keys. Im curious as to the purpose for decoding them. I assume this is to recover information needed to create new keys.These tools needed to do this, i believe would be the 8.1 sdk of the rms, which is apparently really hard to get. Ive read a little over on the crackz site but all the sdks are locked up tight (not that any would work for me). I guess what im saying is this is going to be really impossible for me without some help. Wether it be a little guidance or some software or a link. I would really appreciate it.

Last edited by jarm : 07-02-2010 at 07:07 PM.
Reply With Quote
  #2  
Old 06-27-2010, 12:49 AM
BfoX BfoX is offline
Senior Member
 
Join Date: Aug 2007
Posts: 2,236
Send a message via ICQ to BfoX Send a message via MSN to BfoX Send a message via Yahoo to BfoX
Default

as sample:

* Feature name : ArcWeld_PowerPac
* Feature vers : 5.12
* Vendor ID : 17386
* Num Secrets : 7
* Secrets[1..7] : skipped...
* Vendor info :
__________________
... Either you work well or you work much ....
Reply With Quote
  #3  
Old 06-27-2010, 06:24 PM
jarm jarm is offline
Member
 
Join Date: Aug 2009
Posts: 19
Default

I really am thankful for the vendor id, but I have come to realalize these keys are not even encrypted, how did you pull the vid from them. All the software ive found that produces the vid, required the encrypted keys. I'm just wondering. Thanks
Reply With Quote
  #4  
Old 06-28-2010, 09:34 AM
calvin calvin is offline
Senior Member
 
Join Date: Feb 2010
Posts: 50
Default

setting a correct BP in lsdecode will give you all the hidden info
Reply With Quote
  #5  
Old 06-28-2010, 10:51 PM
robin1044 robin1044 is offline
Senior Member
 
Join Date: Mar 2008
Posts: 189
Default

@Jarm : ready to use solution is for fresh crackers, you better try to find the right point by yourself.
Hint: just use 'lservrc' filled with license with known VID and after decoding look for VID, then set hardware-bp on write and restart olly. you will find right position for VID (which ofcourse differs from one version of lsdecode to the other - SO YOU ARE AN STEP AHEAD
Reply With Quote
Reply


Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump





Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2020, Jelsoft Enterprises Ltd.