Reverse Engineering RET Homepage RET Members Reverse Engineering Projects Reverse Engineering Papers Reversing Challenges Reverser Tools RET Re-Search Engine Reverse Engineering Forum Reverse Engineering Links

Go Back   Reverse Engineering Team Board > Reverse Engineering Board > Reverse/Social Engineering
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Thread Tools Display Modes
Old 09-04-2010, 03:37 PM
narciszu narciszu is offline
Senior Member
Join Date: Apr 2008
Location: r0m4n14
Posts: 77
Default Dump HASP4 M1

Hello all !
I have an "old" problem. Just I buyed one old dongle from an electronic store (something like eBuy but romanian one) just for fun and study. This dongle is HASP4 M1 type. I don't know neither about what software protect this key and password to acces memory on it. I suppose I need a kind of brute force program to find passwords first. Something like h4dmp or h5dmp but with brute force capabilities. On the other hand, I read that exist hardware writer for this old kind of dongle but I don't know where. With this I could write my own password on it. I need some guide lines if you can help me.
P.S. I studied a lot about emulating HASP. I have good result with many soft. I used multikey and HASPHL2008 for this.
Thank you !

Later edit.
Problem solved by myself. Dongle is for OptiTex v9.6. Thank you anyway.

Methods are described in the following posts:

Last edited by narciszu : 10-26-2010 at 04:42 AM.
Reply With Quote
Old 10-18-2010, 08:36 PM
farabi farabi is offline
Junior Member
Join Date: Nov 2008
Posts: 2
Default How??


Can you pls tell me how did you solved the problem??

Im also in same situation..

Hope youll help..

Thanks in advance

Last edited by Git : 10-19-2010 at 01:28 PM.
Reply With Quote

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump

Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2022, Jelsoft Enterprises Ltd.