![]() |
![]() |
![]() |
![]() |
![]() |
||||||||||
|
||||||||||||||
![]() |
#1
|
|||
|
|||
![]() Hello there!
I am relatively new to dongle emulation and reverse engineering, so I'm afraid this is a very basic question, I've searched on the forum but haven't found any answer. I've done already a Sentinel dongle emulation with the help from the threads here at this forum, and it was quite easy with all the info in here. But this time I'm not sure what brand is the dongle. It seems to me that it could be a protection made by the same company as the software itself. No drivers are installed, but the program installs its own little "server", which identifies the dongle and sends its info - via TCP (crackable?) - to the application. I've checked at Process Manager, but it seems that the dongle is identifyied as an Human Interface Device (HID), and its driver is said to be an HID-compilant (generic) device. So, here are my questions: 1 - Is it possible that the dongle is from any already available emulators? If it is, how could I identify it? 2 - If not, would there be any workaround, such as creating a table myself, and using a vusbus-like program to emulate it? Are there any guidelines to do it? I'm thinking that maybe intercepting the TCP calls made by this app and creating a fake server would do. What do you think? Thanks a lot for the help! |
#2
|
|||
|
|||
![]() It may be driver less range of the dongle aka
Eutron/SmartKey 3 DL or Rockey4ND...
__________________
... Either you work well or you work much .... |
#3
|
|||
|
|||
![]() Could be UniKey
Git |
#4
|
|||
|
|||
![]() Sometimes a picture tells more.
|
#5
|
|||
|
|||
![]() Could be SparKey
__________________
... Either you work well or you work much .... |
#6
|
|||
|
|||
![]() Hey Guys!
Thanks for all the replies! I really appreciate your help! I haven't answered the messages yet because I found this link, which suggests that the program whose dongle I want to emulate (EMME/3) is protected with an Aladdin Hardlock (and it even has its ModAd). So I've been trying all this time to dump it as if it were an Aladdin Hardlock, with no success at all. I've tried bruteforcing hl-dump twice,one with the dongle server open, and one with it closed, I've tried some two different versions of Toro Monitor, also haSploGer (from sataron and xyrurg), tried SENTEMUL2008 and SENTEMUL2007 (which gives me the blue screen of death). Nothing worked. Not a single blick of identifying it as an Aladdin Hardlock - they all just ignored the presence of the hardlock. So I'm guessing it's not an Aladdin Hardlock after all... As for the ones you guys listed here, I'll try them all, but as of now I've only tried Eutron (eudump.exe), that doesn't recognize it at all. I've seen pictures of them all, though, and none of them ressembles the dongle I have. Actually, since you asked for pictures, here it is. Sorry for the lack of focus & poor quality, I have no cameras besides a webcam with me right now. But I guess we can see that it is very different from other dongles. (it's weight is also different from others - it is much heavier) Do you have any ideas? The application itself is small (50mb), so I can upload it if you'd like to examine it. Maybe it's time to think about actually cracking it. I'll take a look at that option more carefully, but it must be beyond my cracking experience. Thanks again for the help! van Last edited by vanity : 09-13-2008 at 02:39 PM. |
#7
|
|||
|
|||
![]() The application itself is small (50mb), so if you can upload it we'd like to examine it.
|
#8
|
|||
|
|||
![]() Do you have a file called inrokey.sys in system32\drivers\ ?
Git |
#9
|
|||
|
|||
![]() @kodyazan
http://rapidshare.com/files/145070640/emme-3.0.41.rar pass: reboard @Git Yes! Indeed I have!!! |
#10
|
|||
|
|||
![]() There is your answer. It is an InroKey dongle.
Git |