Reverse Engineering RET Homepage RET Members Reverse Engineering Projects Reverse Engineering Papers Reversing Challenges Reverser Tools RET Re-Search Engine Reverse Engineering Forum Reverse Engineering Links

Go Back   Reverse Engineering Team Board > Reverse Engineering Board > Reverse Code Engineering
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Reply
 
Thread Tools Display Modes
  #1  
Old 02-19-2012, 08:05 PM
Cryogenetica Cryogenetica is offline
Member
 
Join Date: Mar 2011
Posts: 9
Default Software Version upgrade Kills crack

Hi Guys,

The situation:

I have a target software which is already cracked (which is great) but unfortunately the version number it was cracked for is 10.02e which is now quite outdated.

When I go to upgrade the software from 10.02e to 10.50i (which is currently the latest version) the crack seems to stay in place but then drops out after about 10 days or so rendering the software unusable.

A little about the crack:

The crack itself is a simple extraction *.exe which overwrites the "Sxfoxpro.dll" which sits in the LIB folder in the applications root (quite generally C:\GENSQL\LIB).

When the crack is applied correctly the application will launch to a logon screen which will allow the users to obviously access the software.

Other versions of the same application:

This application comes in a straight fox version as well running the good old DBFS file structure. I have a crack for this application as well, but it's slightly different.

We (myself and the awesome members of this community) dumped and emulated the sentinel hardware dongle using multikey. Which effectively eliminates the issue I am having above as it works on the sentinel level instead of the application level.

My current status:

As it stands I have 3 possible solutions, none of which I have had any luck with yet.

Solution 1:
SP32W.dll

I remember a little while back when I was trying to crack the Foxpro version of the application one of the places we were looking at was the SP32W.dll.

We were using this method for some time again on the same 10.02e for the foxpro, but ran into the same problem as above when upgrading caused the modules to drop out as the SP32W file wasn't able to dynamically change for serials like the current multikey fix.

Solution 2:
Sxfoxpro.dll

Considering how well the previous version of the Sxfoxpro.dll patch worked I would have no hesitation in considering an enhanced version to work with the new 10.50i and a way that I can manually produce the new file each time a new version is released.

Solution 3:
Another multikey fix

I wish it was as simple as using the multikey fix from the foxpro version of the software but as we all know we like to make things as difficult as possible.

General Information and Screenshots:

This first image is how the dongles look when they are in the computer. It looks like there are two. That's because I have the multikey crack for the Fox version installed and plugged the physical dongle into the PC at the same time.

The one which reads location 1 is the multikey the on which shows Port_#009.Hub_#0001 is the physical.



These next 2 images are the dongle top and bottom respectively encase you wanted to have a look.





This is the error which comes up after the however many days after upgrading the software (this is prior to the application log on screen).



Links:

None of this information would be very helpful without links so here it is.

http://edoc.com/zt6bohpffbpu

It's zipped using 7zip and contains setup files for 10.02e and the upgrade package in a separate folder as well as the current sxfoxpro.dll crack.

A full video of the installation process can be provided on request (just didn't want to record one unless you needed it).

If your wanting a copy of the Foxpro version including the multikey crack I'm using this is also available upon request.

I tried to provide as much information as I could on all the background without influencing the outcome of your potential solution with the methods I have already explored.

Looking forward to working with anyone whos keen!
Reply With Quote
  #2  
Old 02-20-2012, 02:46 AM
yogi_saw yogi_saw is offline
Senior Member
 
Join Date: May 2009
Posts: 533
Default

Impressive crack request. Crack request not allowed here but I can suggest u decompile ur soft with foxpro decompiler, hv look for dongle calls, eleminate then and recompile same
__________________
"Don't backstab me, i have two eyes on my back..." saint DABANGG
Reply With Quote
  #3  
Old 02-20-2012, 07:01 AM
gnerogeem gnerogeem is offline
Senior Member
 
Join Date: Aug 2009
Location: Kalimdor
Posts: 553
Default

How about no? No crack request here please.
__________________
Pink is the new black.
Reply With Quote
  #4  
Old 02-20-2012, 07:23 PM
Cryogenetica Cryogenetica is offline
Member
 
Join Date: Mar 2011
Posts: 9
Default

[Please DO NOT reply to yourself, use the Edit button to edit your post]

@yogi_saw
Thanks for the suggestion, I've tried several different decompilers on the application itself which get me most if not all the source except for the main.* files which are the ones which call the sentinel dongle.

RefoxXI+, (insert Chinese characters here), (insert Russian characters here), Probably maybe 10 or so programs in total. At one point I even tried an application which injected a save state into the call *.exe to see if I could stop some kind of time based thing.

I attempted CAB extraction, monitors on installshield and associated *ins files to see if I could find something I could alter with no luck.

I had the same issue with the fox version as well. This is why when I went about using the multikey emulation to simulate the key as opposed to manipulate the call code and have to recompile.

Considering the SP32W thing we were using before was a lesser version of the solution we have currently for the fox it was really just looking for a way to enhance that.

@gnerogeem
Thank you for making a valuable contribution to this thread.

This is not simply a request for crack... I have cracks for both of my software I am looking to enhance my SQL version crack to match my Fox Crack so I can upgrade my software.

I have no quams at all in putting in the effort to provide information, on both the software and what I have done and would also like to make it very clear i'm not just putting this up here and forgetting about it, I am still actively working to solve it myself.

Just sort of give you guys some what of an indication of what I have at the moment.

I have used Sentinel Dumper from software-key.org to create the 3832.bin file which I have attached here.

http://edoc.com/vtds4p2mutu4

I have also tried using PVA3.3 without any success.

it gives me the following message with and without Brute WP on

Local scanning...
Server: LOCAL (Version: 6.3.1)
Key found: 3832 - Hard Limit: 1 (In use: 0)
Subnet scanning...
Check TCP servers...
Check IPX servers...
No server responded to the client broadcast. There is no server running
Completed

Using "Toro Hasp Logger V4.0 public" I managed to catch the traffic from connect to port and opening app. The only thing is when I opened the app the Toro Logger crashed every time and 9 times out of 10 (I actually did this 10 times) it failed to collect any data because it crashed.

However on my 10th attempt I managed to get the following data from it.

Code:
ControlTransfer , IN
SetupPacket:
80 06 00 02 00 00 09 00 
	Data:
	09 02 C1 00 03 01 00 E0 
	00 
ControlTransfer , IN
SetupPacket:
80 06 00 02 00 00 C1 00 
	Data:
	09 02 C1 00 03 01 00 E0 
	00 09 04 00 00 03 E0 01 
	01 00 07 05 81 03 10 00 
	01 07 05 02 02 40 00 01 
	07 05 82 02 40 00 01 09 
	04 01 00 02 E0 01 01 00 
	07 05 03 01 00 00 01 07 
	05 83 01 00 00 01 09 04 
	01 01 02 E0 01 01 00 07 
	05 03 01 09 00 01 07 05 
	83 01 09 00 01 09 04 01 
	02 02 E0 01 01 00 07 05 
	03 01 11 00 01 07 05 83 
	01 11 00 01 09 04 01 03 
	02 E0 01 01 00 07 05 03 
	01 19 00 01 07 05 83 01 
	19 00 01 09 04 01 04 02 
	E0 01 01 00 07 05 03 01 
	21 00 01 07 05 83 01 21 
	00 01 09 04 01 05 02 E0 
	01 01 00 07 05 03 01 31 
	00 01 07 05 83 01 31 00 
	01 09 04 02 00 00 FE 01 
	00 00 07 21 07 88 13 FF 
	03 
ControlTransfer , IN
SetupPacket:
80 00 00 00 00 00 02 00 
	Data:
	01 00 
ControlTransfer , IN
SetupPacket:
20 00 00 00 00 00 03 00 
	Data:
	00 00 00 
ControlTransfer , IN
SetupPacket:
20 00 00 00 00 00 03 00 
	Data:
	23 41 E7 
ControlTransfer , IN
SetupPacket:
20 00 00 00 00 00 03 00 
	Data:
	7F A2 E9 
ControlTransfer , IN
SetupPacket:
20 00 00 00 00 00 03 00 
	Data:
	7F A2 E9 
ControlTransfer , IN
SetupPacket:
20 00 00 00 00 00 03 00 
	Data:
	7F A2 E9 
ControlTransfer , IN
SetupPacket:
20 00 00 00 00 00 03 00 
	Data:
	DB 03 EC 
ControlTransfer , IN
SetupPacket:
20 00 00 00 00 00 04 00 
	Data:
	DB 03 EC 35 
ControlTransfer , IN
SetupPacket:
20 00 00 00 00 00 03 00 
	Data:
	00 00 00 
ControlTransfer , IN
SetupPacket:
20 00 00 00 00 00 04 00 
	Data:
	07 78 EF 36 
ControlTransfer , IN
SetupPacket:
20 00 00 00 00 00 04 00 
	Data:
	07 78 EF 36 
ControlTransfer , IN
SetupPacket:
20 00 00 00 00 00 0B 00 
	Data:
	07 78 EF 36 21 F0 CC 01 
	77 00 00 
ControlTransfer , IN
SetupPacket:
20 00 00 00 00 00 03 00 
	Data:
	63 D9 F1 
ControlTransfer , IN
SetupPacket:
20 00 00 00 00 00 05 00 
	Data:
	63 D9 F1 36 21 
ControlTransfer , IN
SetupPacket:
20 00 00 00 00 00 07 00 
	Data:
	63 D9 F1 36 21 F0 CC 
ControlTransfer , IN
SetupPacket:
20 00 00 00 00 00 04 00 
	Data:
	63 D9 F1 36 
ControlTransfer , IN
SetupPacket:
20 00 00 00 00 00 07 00 
	Data:
	BF 3A F4 36 21 F0 CC 
ControlTransfer , IN
SetupPacket:
20 00 00 00 00 00 04 00 
	Data:
	BF 3A F4 36 
ControlTransfer , IN
SetupPacket:
20 00 00 00 00 00 04 00 
	Data:
	BF 3A F4 36 
ControlTransfer , IN
SetupPacket:
20 00 00 00 00 00 06 00 
	Data:
	BF 3A F4 36 21 F0 
ControlTransfer , IN
SetupPacket:
20 00 00 00 00 00 F4 00 
	Data:
	1B 9C F6 36 21 F0 CC 01 
	7E 00 00 00 00 00 00 00 
	1B 9C F6 36 21 F0 CC 01 
	68 00 00 00 00 00 00 00 
	01 00 00 00 50 00 1A 00 
	00 00 00 00 68 FC 58 84 
	22 00 00 00 9C FC 58 84 
	00 00 00 00 0A 00 00 00 
	7D A0 2B 84 00 00 00 00 
	00 00 00 00 FF FF FF FF 
	0D F0 AD DE FF 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	10 C5 7B 84 00 00 00 00 
	00 00 F4 00 33 0C 07 FC 
	0F FF FF FF FF FF 77 FD 
	F8 36 21 F0 CC 01 72 00 
	00 00 00 00 00 00 1B 9C 
	F6 36 21 F0 CC 01 69 00 
	00 00 00 00 00 00 00 00 
	00 00 48 00 09 00 00 00 
	00 00 68 FC 58 84 22 00 
	00 00 04 38 D9 83 03 00 
	00 00 06 00 00 00 38 BD 
	3B 84 08 6F 21 84 00 00 
	00 00 FF FF FF FF 0D F0 
	AD DE 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 0E 04 01 33 0C 00 
	77 FD F8 36 
ControlTransfer , IN
SetupPacket:
20 00 00 00 00 00 0A 00 
	Data:
	77 FD F8 36 21 F0 CC 01 
	6F 01 
ControlTransfer , IN
SetupPacket:
20 00 00 00 00 00 FB 00 
	Data:
	77 FD F8 36 21 F0 CC 01 
	78 00 00 00 00 00 00 00 
	77 FD F8 36 21 F0 CC 01 
	70 00 00 00 00 00 00 00 
	01 00 00 00 50 00 1A 00 
	00 00 00 00 68 FC 58 84 
	22 00 00 00 9C FC 58 84 
	00 00 00 00 04 00 00 00 
	7D A0 2B 84 00 00 00 00 
	00 00 00 00 FF FF FF FF 
	0D F0 AD DE FF 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	10 C5 7B 84 00 00 00 00 
	00 00 FB 00 1A 0C 01 02 
	77 FD F8 36 21 F0 CC 01 
	72 00 00 00 00 00 00 00 
	77 FD F8 36 21 F0 CC 01 
	71 00 00 00 00 00 00 00 
	00 00 00 00 48 00 09 00 
	00 00 00 00 68 FC 58 84 
	22 00 00 00 04 38 D9 83 
	03 00 00 00 06 00 00 00 
	C8 B3 10 84 F8 60 97 84 
	00 00 00 00 FF FF FF FF 
	0D F0 AD DE 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 0E 04 01 1A 
	0C 00 77 FD F8 36 21 F0 
	CC 01 6C 00 00 00 00 00 
	00 00 77 
ControlTransfer , IN
SetupPacket:
20 00 00 00 00 00 04 00 
	Data:
	D3 5E FB 36 
ControlTransfer , IN
SetupPacket:
20 00 00 00 00 00 F4 00 
	Data:
	D3 5E FB 36 21 F0 CC 01 
	7A 00 00 00 00 00 00 00 
	D3 5E FB 36 21 F0 CC 01 
	78 00 00 00 00 00 00 00 
	01 00 00 00 50 00 1A 00 
	00 00 00 00 68 FC 58 84 
	22 00 00 00 9C FC 58 84 
	00 00 00 00 06 00 00 00 
	7D C4 19 84 00 00 00 00 
	00 00 00 00 FF FF FF FF 
	0D F0 AD DE FF 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	10 C5 7B 84 00 00 00 00 
	00 00 F4 00 24 0C 03 04 
	01 02 2F C0 FD 36 21 F0 
	CC 01 72 00 00 00 00 00 
	00 00 D3 5E FB 36 21 F0 
	CC 01 79 00 00 00 00 00 
	00 00 00 00 00 00 48 00 
	09 00 00 00 00 00 68 FC 
	58 84 22 00 00 00 04 38 
	D9 83 03 00 00 00 06 00 
	00 00 A0 A8 13 84 08 3B 
	2D 84 00 00 00 00 FF FF 
	FF FF 0D F0 AD DE 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 0E 04 
	01 24 0C 00 2F C0 FD 36 
	21 F0 CC 01 
ControlTransfer , IN
SetupPacket:
20 00 00 00 00 00 06 00 
	Data:
	2F C0 FD 36 21 F0 
ControlTransfer , IN
SetupPacket:
20 00 00 00 00 00 F4 00 
	Data:
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00 00 00 00 00 
	00 00 00 00
That being said, I don't know if this information is complete and given the fact that it never produced the *.bin file prefixed with
"TORO_HASP_LOG_"

I have noticed that other users have been using PVA to solve the bin to dmp but as yet still searching through posts on here and though out the WWW to find what I can.

As always, constructive input / suggestions are welcome

Last edited by Git : 02-20-2012 at 10:04 PM.
Reply With Quote
  #5  
Old 02-20-2012, 09:11 PM
kjms kjms is offline
Senior Member
 
Join Date: Aug 2009
Posts: 337
Default

use multikey 18.2.3 and above save as reg,28 enh algo
already you posted same dongle reg with different serial no here
Code:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MultiKey\Dumps\00003832]
"DongleType"=dword:00000003
"Copyright"="Git"
"Created"="Mon Feb 20 17:11:34.88 2012"
"Name"="3832 Sentinel SuperPro Dump"
"Type"=dword:00000000
"CellType"=hex:\ 
    01,01,03,03,03,01,03,01,03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,03,03,03,03,03,03,03,03
"sntMemory"=hex:\ 
    BE,19,32,38,00,00,00,00,00,00,00,00,43,4A,00,00,\ 
    22,1E,CF,C9,1E,3B,F6,EF,F0,6E,C3,E8,6C,16,AD,FD,\ 
    2A,6F,0A,F0,D8,31,CC,EE,C5,3A,67,EC,93,10,A4,FB,\ 
    CD,53,42,C9,6C,52,DC,DC,D5,35,83,D6,B0,31,B4,E3,\ 
    1F,62,F8,DC,B1,0C,8F,C6,D7,63,53,E0,B3,53,C0,CA,\ 
    AB,3A,20,C6,67,57,BC,FF,91,59,8B,D0,05,1A,D3,F7,\ 
    53,78,B8,C8,CE,46,4B,CF,E6,7E,7F,D8,9D,51,BA,E2,\ 
    86,21,92,DA,13,0B,37,D9,4F,5D,C3,E8,38,75,7D,ED

Last edited by kjms : 02-20-2012 at 09:25 PM.
Reply With Quote
  #6  
Old 02-21-2012, 05:26 AM
Cryogenetica Cryogenetica is offline
Member
 
Join Date: Mar 2011
Posts: 9
Default Marvelous

Hi KJMS,

Thanks heaps for the *.reg you really do work wonders.

What I did was copy the folder I was using for the other crack and update the reg and dat with this new reg file to make the new one.

I grabbed a newer copy of Multikey (mk18.2.3) and updated it to this new reg and dat which functions fine on the XP32 (I will be testing on 7 x32 tomorrow).

I remember from the last time we did this that there was something special we needed to do in order to get the x64 to work.

I am still using "Readydriverplus 1.2" on my x64 installation to disable the driver signing in order for multikey to register so it's not that which is the problem.

I have also been through an manually compared the two working Fox cracks to see if it was something which I missed or needed to change in order to get through.

PRO x32 (Working)
Download Link:
http://edoc.com/r0q3vqa8qblh

Reg File:
Code:
Windows Registry Editor Version 5.00
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MultiKey\Dumps]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MultiKey\Dumps\00003832]
"DongleType"=dword:00000003
"Copyright"="kjms"
"Created"="Wed Mar 09 08:07:03.904 2011"
"Name"="3832 Sentinel SuperPro Dump"
"Type"=dword:00000000
"CellType"=hex:\ 
    01,01,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03
"sntMemory"=hex:\ 
    8E,03,32,38,00,00,00,00,00,00,00,00,43,4A,00,00,\ 
    2C,49,F2,FB,C2,EE,AA,C1,F7,4B,A7,E4,08,7A,9F,CE,\ 
    3B,63,DC,CA,3F,FF,E3,C3,25,4D,6E,DB,5F,2A,2F,F8,\ 
    33,64,00,EE,FC,34,A0,CB,E7,38,85,FB,4A,37,8D,EE,\ 
    6A,57,C3,E0,1D,2E,30,F3,CB,79,6D,F8,F4,3F,60,EA,\ 
    11,65,43,F4,D1,39,11,EF,97,3D,68,CD,D9,29,E1,FE,\ 
    71,65,BF,F4,6F,CA,58,C3,0D,33,94,DD,C6,5C,BC,E8,\ 
    08,2E,6A,E1,7A,7C,2D,ED,93,14,0C,FC,7A,50,47,E1
SQL x32 (Working)
Download Link:
http://edoc.com/loaqjmrzn7ad

Reg File:
Code:
Windows Registry Editor Version 5.00
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MultiKey\Dumps]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MultiKey\Dumps\00003832]
"DongleType"=dword:00000003
"Copyright"="Git"
"Created"="Mon Feb 20 17:11:34.88 2012"
"Name"="3832 Sentinel SuperPro Dump"
"Type"=dword:00000000
"CellType"=hex:\ 
    01,01,03,03,03,01,03,01,03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,03,03,03,03,03,03,03,03
"sntMemory"=hex:\ 
    BE,19,32,38,00,00,00,00,00,00,00,00,43,4A,00,00,\ 
    22,1E,CF,C9,1E,3B,F6,EF,F0,6E,C3,E8,6C,16,AD,FD,\ 
    2A,6F,0A,F0,D8,31,CC,EE,C5,3A,67,EC,93,10,A4,FB,\ 
    CD,53,42,C9,6C,52,DC,DC,D5,35,83,D6,B0,31,B4,E3,\ 
    1F,62,F8,DC,B1,0C,8F,C6,D7,63,53,E0,B3,53,C0,CA,\ 
    AB,3A,20,C6,67,57,BC,FF,91,59,8B,D0,05,1A,D3,F7,\ 
    53,78,B8,C8,CE,46,4B,CF,E6,7E,7F,D8,9D,51,BA,E2,\ 
    86,21,92,DA,13,0B,37,D9,4F,5D,C3,E8,38,75,7D,ED
PRO x64 (Working)
Download Link:
http://edoc.com/2fm37572mbq8

Reg File:
Code:
Windows Registry Editor Version 5.00
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MultiKey\Dumps]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MultiKey\Dumps\00003832]
"DongleType"=dword:00000003
"Copyright"="kjms"
"Created"="Wed Mar 09 08:07:03.904 2011"
"Name"="3832 Sentinel SuperPro Dump"
"Type"=dword:00000000
"CellType"=hex:\ 
    01,01,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03
"sntMemory"=hex:\ 
    8E,03,32,38,00,00,00,00,00,00,00,00,43,4A,00,00,\ 
    2C,49,F2,FB,C2,EE,AA,C1,F7,4B,A7,E4,08,7A,9F,CE,\ 
    3B,63,DC,CA,3F,FF,E3,C3,25,4D,6E,DB,5F,2A,2F,F8,\ 
    33,64,00,EE,FC,34,A0,CB,E7,38,85,FB,4A,37,8D,EE,\ 
    6A,57,C3,E0,1D,2E,30,F3,CB,79,6D,F8,F4,3F,60,EA,\ 
    11,65,43,F4,D1,39,11,EF,97,3D,68,CD,D9,29,E1,FE,\ 
    71,65,BF,F4,6F,CA,58,C3,0D,33,94,DD,C6,5C,BC,E8,\ 
    08,2E,6A,E1,7A,7C,2D,ED,93,14,0C,FC,7A,50,47,E1

SQL x64 (Not Working)
Download Link:
http://edoc.com/r6qn86oqrba4

Reg File:
Code:
Windows Registry Editor Version 5.00
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MultiKey\Dumps]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MultiKey\Dumps\00003832]
"DongleType"=dword:00000003
"Copyright"="Git"
"Created"="Mon Feb 20 17:11:34.88 2012"
"Name"="3832 Sentinel SuperPro Dump"
"Type"=dword:00000000
"CellType"=hex:\ 
    01,01,03,03,03,01,03,01,03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,03,03,03,03,03,03,03,03
"sntMemory"=hex:\ 
    BE,19,32,38,00,00,00,00,00,00,00,00,43,4A,00,00,\ 
    22,1E,CF,C9,1E,3B,F6,EF,F0,6E,C3,E8,6C,16,AD,FD,\ 
    2A,6F,0A,F0,D8,31,CC,EE,C5,3A,67,EC,93,10,A4,FB,\ 
    CD,53,42,C9,6C,52,DC,DC,D5,35,83,D6,B0,31,B4,E3,\ 
    1F,62,F8,DC,B1,0C,8F,C6,D7,63,53,E0,B3,53,C0,CA,\ 
    AB,3A,20,C6,67,57,BC,FF,91,59,8B,D0,05,1A,D3,F7,\ 
    53,78,B8,C8,CE,46,4B,CF,E6,7E,7F,D8,9D,51,BA,E2,\ 
    86,21,92,DA,13,0B,37,D9,4F,5D,C3,E8,38,75,7D,ED
Aside from this I was wondering how you turned the bin into a dmp and subsequent reg I guess? - the reason I ask is because I have a third dongle which I would like to do this for and was hoping I could maybe learn where I was going wrong?

I havn't done the bin for it yet, but I should be able to do that tomorrow when I test the SQL x32 on win 7.

I am also going to be testing on SBS2011 x32 and x64, currently I only have access to a x64 but will be making a x32 as well.

@moderator who edited my previous post, my apologies, I will add/edit instead of replying to myself in future.
Reply With Quote
  #7  
Old 02-21-2012, 06:06 AM
hasp hasp is offline
Member
 
Join Date: May 2011
Posts: 7
Default

SQL mkey 64bit edit the reg cell 5,7=3
"CellType"=hex:\
01,01,03,03,03,03,03,03,03,03,03,03,03,03,03,03,\
Reply With Quote
  #8  
Old 03-19-2012, 09:14 PM
Cryogenetica Cryogenetica is offline
Member
 
Join Date: Mar 2011
Posts: 9
Default

@hasp I have tired to changed the code and still not having any success.

Code:
Windows Registry Editor Version 5.00
[-HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MultiKey\Dumps]
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MultiKey\Dumps\00003832]
"DongleType"=dword:00000003
"Copyright"="Git"
"Created"="Mon Feb 20 17:11:34.88 2012"
"Name"="3832 Sentinel SuperPro Dump"
"Type"=dword:00000000
"CellType"=hex:\ 
    01,01,03,03,03,03,03,03,03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,03,03,03,03,03,03,03,03
"sntMemory"=hex:\ 
    BE,19,32,38,00,00,00,00,00,00,00,00,43,4A,00,00,\ 
    22,1E,CF,C9,1E,3B,F6,EF,F0,6E,C3,E8,6C,16,AD,FD,\ 
    2A,6F,0A,F0,D8,31,CC,EE,C5,3A,67,EC,93,10,A4,FB,\ 
    CD,53,42,C9,6C,52,DC,DC,D5,35,83,D6,B0,31,B4,E3,\ 
    1F,62,F8,DC,B1,0C,8F,C6,D7,63,53,E0,B3,53,C0,CA,\ 
    AB,3A,20,C6,67,57,BC,FF,91,59,8B,D0,05,1A,D3,F7,\ 
    53,78,B8,C8,CE,46,4B,CF,E6,7E,7F,D8,9D,51,BA,E2,\ 
    86,21,92,DA,13,0B,37,D9,4F,5D,C3,E8,38,75,7D,ED
For interests sake I went and found another dongle for a similar product to the one I had to see if I could replicate the process from dongle to reg just as kjms managed to do.

Here are the steps I have followed so far:

Machine 1 - Windows XP x32
1: Installed Target Software + Sentinel 7.6.3

2: Tested to make sure it was prompting for dongle (which it was)

3: Insert Dongle + Test software (working)


4: Ran SSUMD which gave me 00003832.log, 00003832.reg and 3832.bin

This is the *.reg

Code:
REGEDIT4

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MultiKey\Dumps\00003832]
"Name"="SSPRO dump without algo!"
"CopyLeft"="(c)Elite"
"DongleType"=dword:00000003
"Type"=dword:00000000
"CellType"=hex:\
01,01,03,03,03,01,03,01,\
03,03,03,03,03,03,03,03,\
03,03,03,03,03,03,03,03,\
03,03,03,03,03,03,03,03,\
03,03,03,03,03,03,03,03,\
03,03,03,03,03,03,03,03,\
03,03,03,03,03,03,03,03,\
03,03,03,03,03,03,03,03

"sntMemory"=hex:\
02,1B,32,38,00,00,00,00,00,00,00,00,00,00,11,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00

5: Ran PVA_3.3 once with Brute and once without both gave me spro_RNBO_SPN_DRIVER_3832_0.dmp at the same size.

6: Ran dumper which gave me sspro_00003832.dmp

7: Used Git's dmp2mkey on the 3 dmp's I got giving me

PVA_3.3 (NO WP)

Code:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MultiKey\Dumps\00003832]
"DongleType"=dword:00000003
"Copyright"="None"
"Created"="Tue Mar 20 08:24:43.797 2012 by dmp2mkey v2.5.9.1"
"Name"="3832 Sentinel SuperPro Dump"
"Type"=dword:00000000
"CellType"=hex:\ 
    01,01,03,03,03,01,03,01,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03
"sntMemory"=hex:\ 
    02,1B,32,38,00,00,00,00,00,00,00,00,43,4A,00,00,\ 
    BF,59,D1,D2,63,27,18,D8,FA,61,4C,F7,33,1E,4F,F4,\ 
    5A,11,24,E6,14,2D,B8,EA,C3,72,34,C6,45,85,82,C2,\ 
    FB,7D,D5,DD,7C,66,C5,F2,F8,1F,40,FB,B0,20,CF,EE,\ 
    32,5F,18,CE,F4,1F,AD,D1,82,14,B8,D6,CE,2B,73,F0,\ 
    B0,53,58,FB,7C,3C,96,DB,D9,1C,28,EF,33,5D,30,C9,\ 
    F1,70,D3,D0,B9,44,7D,E8,D4,5F,3C,D5,34,31,4A,FD,\ 
    B5,1C,CB,ED,FA,15,FB,D0,33,6D,B6,DC,11,AE,B7,C2
PVA_3.3 (With WP)

Code:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MultiKey\Dumps\00003832]
"DongleType"=dword:00000003
"Copyright"="None"
"Created"="Tue Mar 20 08:28:58.564 2012 by dmp2mkey v2.5.9.1"
"Name"="3832 Sentinel SuperPro Dump"
"Type"=dword:00000000
"CellType"=hex:\ 
    01,01,03,03,03,01,03,01,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03
"sntMemory"=hex:\ 
    02,1B,32,38,00,00,00,00,00,00,00,00,43,4A,00,00,\ 
    BF,59,D1,D2,63,27,18,D8,FA,61,4C,F7,33,1E,4F,F4,\ 
    5A,11,24,E6,14,2D,B8,EA,C3,72,34,C6,45,85,82,C2,\ 
    FB,7D,D5,DD,7C,66,C5,F2,F8,1F,40,FB,B0,20,CF,EE,\ 
    32,5F,18,CE,F4,1F,AD,D1,82,14,B8,D6,CE,2B,73,F0,\ 
    B0,53,58,FB,7C,3C,96,DB,D9,1C,28,EF,33,5D,30,C9,\ 
    F1,70,D3,D0,B9,44,7D,E8,D4,5F,3C,D5,34,31,4A,FD,\ 
    B5,1C,CB,ED,FA,15,FB,D0,33,6D,B6,DC,11,AE,B7,C2
Dumper

Code:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MultiKey\Dumps\00003832]
"DongleType"=dword:00000003
"Copyright"="None"
"Created"="Tue Mar 20 08:36:20.692 2012 by dmp2mkey v2.5.9.1"
"Name"="3832 Sentinel SuperPro Dump"
"Type"=dword:00000000
"CellType"=hex:\ 
    01,01,03,03,03,01,03,01,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03
"sntMemory"=hex:\ 
    02,1B,32,38,00,00,00,00,00,00,00,00,43,4A,11,00,\ 
    BF,59,D1,D2,63,27,18,D8,FA,61,4C,F7,33,1E,4F,F4,\ 
    5A,11,24,E6,14,2D,B8,EA,C3,72,34,C6,45,85,82,C2,\ 
    FB,7D,D5,DD,7C,66,C5,F2,F8,1F,40,FB,B0,20,CF,EE,\ 
    32,5F,18,CE,F4,1F,AD,D1,82,14,B8,D6,CE,2B,73,F0,\ 
    B0,53,58,FB,7C,3C,96,DB,D9,1C,28,EF,33,5D,30,C9,\ 
    F1,70,D3,D0,B9,44,7D,E8,D4,5F,3C,D5,34,31,4A,FD,\ 
    B5,1C,CB,ED,FA,15,FB,D0,33,6D,B6,DC,11,AE,B7,C2
8: I ran all 3 results through WinMerge (text comparison program) to find out the differences between the 3 dmp files.

There was no difference between the WP and Non WP reg's but the Dumper vs PVA_3.3 showed this single diff.

Dumper Result

Code:
"sntMemory"=hex:\ 
    02,1B,32,38,00,00,00,00,00,00,00,00,43,4A,11,00,\
PVA_3.3 Result

Code:
"sntMemory"=hex:\ 
    02,1B,32,38,00,00,00,00,00,00,00,00,43,4A,00,00,\
Because I have read more on here about PVA_3.3 than the Dumper program I decided to try that one first and it worked on both x32 and x64 which was great!

All of the tools mentioned above I've put here.

http://edoc.com/mfxqobykpqjc

And all of their results from dmp's right the way through to production are there in their respective folders.

http://edoc.com/6jg12r73szlk
Reply With Quote
  #9  
Old 03-20-2012, 03:03 AM
Cryogenetica Cryogenetica is offline
Member
 
Join Date: Mar 2011
Posts: 9
Default A thanks, and a guide

@hasp Thanks heaps that seems to be working now

For interests sake I went and found another dongle for a similar product to the one I had to see if I could replicate the process from dongle to reg just as kjms managed to do.

Here are the steps I have followed so far:

Machine 1 - Windows XP x32
1: Installed Target Software + Sentinel 7.6.3

2: Tested to make sure it was prompting for dongle (which it was)

3: Insert Dongle + Test software (working)


4: Ran SSUMD which gave me 00003832.log, 00003832.reg and 3832.bin

This is the *.reg

Code:
REGEDIT4

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MultiKey\Dumps\00003832]
"Name"="SSPRO dump without algo!"
"CopyLeft"="(c)Elite"
"DongleType"=dword:00000003
"Type"=dword:00000000
"CellType"=hex:\
01,01,03,03,03,01,03,01,\
03,03,03,03,03,03,03,03,\
03,03,03,03,03,03,03,03,\
03,03,03,03,03,03,03,03,\
03,03,03,03,03,03,03,03,\
03,03,03,03,03,03,03,03,\
03,03,03,03,03,03,03,03,\
03,03,03,03,03,03,03,03

"sntMemory"=hex:\
02,1B,32,38,00,00,00,00,00,00,00,00,00,00,11,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00

5: Ran PVA_3.3 once with Brute and once without both gave me spro_RNBO_SPN_DRIVER_3832_0.dmp at the same size.

6: Ran dumper which gave me sspro_00003832.dmp

7: Used Git's dmp2mkey on the 3 dmp's I got giving me

PVA_3.3 (NO WP)

Code:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MultiKey\Dumps\00003832]
"DongleType"=dword:00000003
"Copyright"="None"
"Created"="Tue Mar 20 08:24:43.797 2012 by dmp2mkey v2.5.9.1"
"Name"="3832 Sentinel SuperPro Dump"
"Type"=dword:00000000
"CellType"=hex:\ 
    01,01,03,03,03,01,03,01,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03
"sntMemory"=hex:\ 
    02,1B,32,38,00,00,00,00,00,00,00,00,43,4A,00,00,\ 
    BF,59,D1,D2,63,27,18,D8,FA,61,4C,F7,33,1E,4F,F4,\ 
    5A,11,24,E6,14,2D,B8,EA,C3,72,34,C6,45,85,82,C2,\ 
    FB,7D,D5,DD,7C,66,C5,F2,F8,1F,40,FB,B0,20,CF,EE,\ 
    32,5F,18,CE,F4,1F,AD,D1,82,14,B8,D6,CE,2B,73,F0,\ 
    B0,53,58,FB,7C,3C,96,DB,D9,1C,28,EF,33,5D,30,C9,\ 
    F1,70,D3,D0,B9,44,7D,E8,D4,5F,3C,D5,34,31,4A,FD,\ 
    B5,1C,CB,ED,FA,15,FB,D0,33,6D,B6,DC,11,AE,B7,C2
PVA_3.3 (With WP)

Code:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MultiKey\Dumps\00003832]
"DongleType"=dword:00000003
"Copyright"="None"
"Created"="Tue Mar 20 08:28:58.564 2012 by dmp2mkey v2.5.9.1"
"Name"="3832 Sentinel SuperPro Dump"
"Type"=dword:00000000
"CellType"=hex:\ 
    01,01,03,03,03,01,03,01,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03
"sntMemory"=hex:\ 
    02,1B,32,38,00,00,00,00,00,00,00,00,43,4A,00,00,\ 
    BF,59,D1,D2,63,27,18,D8,FA,61,4C,F7,33,1E,4F,F4,\ 
    5A,11,24,E6,14,2D,B8,EA,C3,72,34,C6,45,85,82,C2,\ 
    FB,7D,D5,DD,7C,66,C5,F2,F8,1F,40,FB,B0,20,CF,EE,\ 
    32,5F,18,CE,F4,1F,AD,D1,82,14,B8,D6,CE,2B,73,F0,\ 
    B0,53,58,FB,7C,3C,96,DB,D9,1C,28,EF,33,5D,30,C9,\ 
    F1,70,D3,D0,B9,44,7D,E8,D4,5F,3C,D5,34,31,4A,FD,\ 
    B5,1C,CB,ED,FA,15,FB,D0,33,6D,B6,DC,11,AE,B7,C2
Dumper

Code:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\MultiKey\Dumps\00003832]
"DongleType"=dword:00000003
"Copyright"="None"
"Created"="Tue Mar 20 08:36:20.692 2012 by dmp2mkey v2.5.9.1"
"Name"="3832 Sentinel SuperPro Dump"
"Type"=dword:00000000
"CellType"=hex:\ 
    01,01,03,03,03,01,03,01,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03,\ 
    03,03,03,03,03,03,03,03
"sntMemory"=hex:\ 
    02,1B,32,38,00,00,00,00,00,00,00,00,43,4A,11,00,\ 
    BF,59,D1,D2,63,27,18,D8,FA,61,4C,F7,33,1E,4F,F4,\ 
    5A,11,24,E6,14,2D,B8,EA,C3,72,34,C6,45,85,82,C2,\ 
    FB,7D,D5,DD,7C,66,C5,F2,F8,1F,40,FB,B0,20,CF,EE,\ 
    32,5F,18,CE,F4,1F,AD,D1,82,14,B8,D6,CE,2B,73,F0,\ 
    B0,53,58,FB,7C,3C,96,DB,D9,1C,28,EF,33,5D,30,C9,\ 
    F1,70,D3,D0,B9,44,7D,E8,D4,5F,3C,D5,34,31,4A,FD,\ 
    B5,1C,CB,ED,FA,15,FB,D0,33,6D,B6,DC,11,AE,B7,C2
8: I ran all 3 results through WinMerge (text comparison program) to find out the differences between the 3 dmp files.

There was no difference between the WP and Non WP reg's but the Dumper vs PVA_3.3 showed this single diff.

Dumper Result

Code:
"sntMemory"=hex:\ 
    02,1B,32,38,00,00,00,00,00,00,00,00,43,4A,11,00,\
PVA_3.3 Result

Code:
"sntMemory"=hex:\ 
    02,1B,32,38,00,00,00,00,00,00,00,00,43,4A,00,00,\
Because I have read more on here about PVA_3.3 than the Dumper program I decided to try that one first and it worked on both x32 and x64 which was great!

All of the tools mentioned above I've put here.

http://edoc.com/mfxqobykpqjc

And all of their results from dmp's right the way through to production are there in their respective folders.

http://edoc.com/6jg12r73szlk
Reply With Quote
Reply


Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump





Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2020, Jelsoft Enterprises Ltd.