新闻资讯
网站首页 > 新闻资讯 >

加密狗复制的基本常识

2022-01-04 17:17:03 来源:http://www.sdjkyqyb.com/ 53

现在很多人想对自已使用的加密狗进行复制一个两个,方便同办公司的同事一起使用。要对加密狗复制不是那么简单的一种事情,需要做的事情很多,而且还要懂得很多软硬件知识,在这里简单介绍一下加密狗复制的一点基本常识。
Now many people want to copy one or two of the dongles they use, which is convenient for colleagues who run the company together. It is not so simple to copy the dongle. There are a lot of things to do, and we also need to know a lot of software and hardware knowledge. Here is a brief introduction to the basic knowledge of dongle replication.
加密锁即加密狗,现在一般说的加密狗,一般都是硬件加密狗。是一种类似于u盘一样的东西,是一种防盗版的方式。一般是把程序的一小部分或解密部分集合到加密狗的硬件中,防止软件的盗版。 加密狗(dongle),经常被认为是硬件保护,它是一个可被附加在计算机并口、串口或USB上的小插件,它包含厂家烧制的EPROM和定制的专用集成电路。
The encryption lock is the encryption dog. Now generally speaking, the encryption dog is generally a hardware encryption dog. It is a kind of thing similar to U disk. It is a way of anti-theft version. Generally, a small part or decryption part of the program is collected into the hardware of the dongle to prevent software piracy. Dongle is often regarded as hardware protection. It is a small plug-in that can be attached to the parallel port, serial port or USB of the computer. It contains EPROM fired by the manufacturer and customized special integrated circuit.
dongle保护的的原理就是软件开发在程序里经常检查dongle中的单元(Cell)的并对比返回值,这种检查可以是直接读单元或者是使用某种内部算法(此时单元受到保护无法直接读)。既然破解不行我就说说复制由于加密锁(加密狗)的应用程序接口(API)基本上都是公开的,因此从网上可以很容易下载到加密狗的编程接口API、用户手册、和其它相关资料,还可以了解加密狗技术的新进展。
The principle of dongle protection is that software developers often check the cell in dongle and compare the return value in the program. This check can be to directly read the cell or use some internal algorithm (at this time, the cell is protected and cannot be read directly). Since it can't be cracked, let me talk about replication. Since the application program interface (API) of the encryption lock (dongle) is basically public, it is easy to download the programming interface API, user manual and other relevant materials of the dongle from the Internet, and you can also understand the new progress of the dongle technology.
例如,某个国内知名的美国加密狗提供商的一款很有名的加密狗,其全部编程资料就可以从网上获取到,经过对这些资料的分析,我们知道这个加密锁(加密狗)有64个内存单元,其中56个可以被用户使用,这些单元中的每一个都可以被用为三种类型之一:算法、数据值和计数器。
For example, all the programming data of a well-known American dongle provider can be obtained from the Internet. After analyzing these data, we know that the encryption lock (dongle) has 64 memory units, of which 56 can be used by users. Each of these units can be used as one of three types: algorithm Data values and counters.
数据值比较好理解,数据值是用户存储在可读写的单元中的数据,就和存储在硬盘里一样,用户可以使用Read函数读出存储单元里面的数据,也可以使用Write函数保存自己的信息到存储单元。 计数器是这样一种单元,软件开发商在其软件中使用Decrement函数可以把其值减一,当计数器和某种活动的(active)算法关联时,计数器为零则会封闭(deactive)这个算法。 算法单元较难理解一些,算法(algorithm)是这样一种技术,你用Query(queryData)函数访问它,其中queryData是查询值,上述函数有一个返回值,被加密的程序知道一组这样的查询值/返回值对,在需要加密的地方,用上述函数检查狗的存在和真伪。对于被指定为算法的单元,软件上是无法读和修改的,即使你是合法的用户也是如此,我理解这种技术除了增加程序复杂性以外,主要是为了对付使用模拟器技术的破解。 此加密锁(加密狗)的所有API函数调用都会有返回值,返回值为0的时候表示成功。
The data value is easy to understand. The data value is the data stored in the read-write unit by the user. Just like the data stored in the hard disk, the user can use the read function to read out the data in the storage unit, or use the write function to save his own information to the storage unit. Counter is such a unit. Software developers can reduce its value by one by using the decrement function in their software. When the counter is associated with an active algorithm, zero will close the algorithm. The algorithm unit is difficult to understand. The algorithm is a technology. You use the query (querydata) function to access it. Querydata is the query value. The above function has a return value. The encrypted program knows a set of such query value / return value pairs. Where encryption is required, use the above function to check the existence and authenticity of dogs. The unit designated as the algorithm cannot be read and modified in software, even if you are a legitimate user. I understand that this technology is mainly to deal with the cracking of simulator technology in addition to increasing the complexity of the program. All API function calls of this encryption lock (dongle) will have a return value. When the return value is 0, it indicates success.
因此,破解思路就出来了,就是使用我们自己的工具(如VB、VC等)重新编写构造一个和加密狗API一样的DLL动态库文件,里面也包含Read、Write等全部API中包含的函数,使用的参量及返回值和原来的函数一样,所有函数返回零。然后对Query、Read函数进行处理,返回应用软件需要的数值即可。 这个新的DLL文件编写成功后,直接替换掉原来的DLL文件,这时候再运行应用软件,软件访问加密狗的操作就全部会被拦截,拦截程序永远会返回正确的数据给软件,从而实现了模拟加密狗的运行。
Therefore, the crack idea comes out, that is, we use our own tools (such as VB, VC, etc.) to rewrite and construct a DLL dynamic library file like the dongle API, which also contains the functions contained in all APIs such as read and write. The parameters and return values used are the same as the original functions, and all functions return zero. Then process the query and read functions and return the values required by the application software. After the new DLL file is successfully written, the original DLL file will be directly replaced. At this time, the application software will be run again, and all the operations of the software accessing the dongle will be intercepted. The interceptor will always return the correct data to the software, so as to realize the operation of simulating the dongle.
其实复制也算是一种破解吧,但两者也有本质的区别,相对来说复制比破解好得多,因为不破坏软件的完整性,也不会存在什么缺点。希望通过以上一点常识能帮助一下想复制加密狗的朋友。
In fact, replication is also a kind of cracking, but the two also have essential differences. Relatively speaking, replication is much better than cracking, because it does not destroy the integrity of the software, and there will be no shortcomings. I hope the above common sense can help friends who want to copy the dongle.
本文由浙大中控加密狗为您提供,我们的网站是:http://www.sdjkyqyb.com我们将以全心全意的热情为您提供服务,欢迎您的访问!
This article is provided by Zheda central control dongle. Our website is: http://www.sdjkyqyb.com We will serve you with wholehearted enthusiasm. Welcome to visit!
产品推荐
新闻推荐