新闻资讯
网站首页 > 新闻资讯 >

加密狗破解的三种方法

2022-01-24 16:50:06 来源:http://www.sdjkyqyb.com/ 53

对于加密狗的破解大致可以分为三种方法,一种是通过硬件克隆或复制,一种是通过softice等debug工具调试跟踪解密,一种是通过编写拦截程序修改软件和加密狗之间的通讯。
There are three methods to crack the dongle. One is to clone or copy the dongle through hardware, the other is to debug, track and decrypt the dongle through debug tools such as softice, and the other is to modify the communication between the software and the dongle by writing an interceptor program.
硬件克隆复制主如果针对国产芯片的加密狗,因为国产加密狗公司一般没有焦点加密芯片的制造能力,是以有些使用了市场上通用的芯片,破解者分析出芯片电路以及芯片里写的内部实质意义后,就可以立刻复制或克隆一个纯粹相同的加密狗。不过国外的加密狗就无法使用这类方法,国外加密狗硬件使用的是安全性大好的自己研究制造研发的芯片,凡是很难举行复制,并且现在国内加密狗也在使用进口的智能卡芯片,是以这类硬件克隆的解密方法用处越来越少。
Hardware cloning and copying is mainly for domestic chip dongles. Because domestic dongle companies generally do not have the manufacturing capacity of focus encryption chips, some use chips commonly used in the market. After the cracker analyzes the chip circuit and the internal substantive meaning written in the chip, he can immediately copy or clone a purely identical dongle. However, foreign dongles cannot use such methods. Foreign dongle hardware uses chips with good security, which are researched and developed by ourselves, and it is usually difficult to copy. Now domestic dongles are also using imported smart card chips, so the decryption method of this kind of hardware is less and less useful.
对于debug调试破解,由于软件的庞大度越来越高,编译器产生的代码也越来越多,通过反汇编等方法跟踪调式破解的庞大度已经变患上越来越高,破解成本也越来越高,目前已经很少有人愿意破费大量精神举行如此庞大的破解,错非被破解的软件具有非常高的价值。
For debug debugging and cracking, due to the increasing complexity of the software and more and more code generated by the compiler, the complexity of tracking mode cracking through disassembly and other methods has become higher and higher, and the cracking cost has become higher and higher. At present, few people are willing to spend a lot of energy on such a huge crack, but the cracked software has very high value.
目前加密锁(加密狗)的解密破解工作主要集中在应用程序与加密动态库之间的通讯拦截。这类方法成本较低,也便于实现,看待以单片机等芯片为焦点的加密锁(加密狗)具有不错的解密效验。
At present, the decryption and cracking of encryption lock (dongle) mainly focuses on the communication interception between application and encryption dynamic library. This kind of method has low cost and is easy to implement. The encryption lock (encryption dog) focusing on single chip microcomputer and other chips has good decryption effect.
由于加密锁(加密狗)的应用程序接口(api)基本上都是公开的,是以从网上可以很容易下载到加密狗的编程接口api、用户手册、和其它相关资料,还可以相识加密狗技术的新进展。
Because the application program interface (API) of the encryption lock (dongle) is basically open, it is easy to download the programming interface API, user manual and other relevant materials of the encryption dog from the Internet, and you can also understand the new progress of the encryption dog technology.
例如,某个国内知名的美国加密狗提供商的一款颇有名的加密狗,其全部编程资料就可以从网上获取到,经过对这些资料的分析,我们知道这个加密锁(加密狗)有64个内储存单子元,此中5六个可以被用户使用,这些单元中的每一个均可以被用为三种类型之一:算法、数据值和计数器。
For example, all the programming data of a well-known American dongle provider can be obtained from the Internet. After analyzing these data, we know that the encryption lock (dongle) has 64 internal storage units, of which 56 can be used by users. Each of these units can be used as one of three types: algorithm Data values and counters.
数据值比较好理解,数据值是用户存储在可读写的单元中的数据,就和存储在硬盘里一样,用户可使用read函数读出存储单元里面的数据,也可使用write函数保存自己的信息到存储单元。
The data value is easy to understand. The data value is the data stored in the read-write unit by the user. Just like the data stored in the hard disk, the user can use the read function to read out the data in the storage unit, or use the write function to save his own information to the storage unit.
计数器是这样一种单元,软件研发商在其软件中使用decrent函数可以把其值减一,当计数器和某种活动的(active)算法接洽关系时,计数器为零则会封闭(deactive)这个算法。
A counter is such a unit. Software developers can reduce its value by one by using the increment function in their software. When the counter is in contact with an active algorithm, a zero counter will close the algorithm.
算法单元较难理解一些,算法(algorithm)是这样一种技术,你用query(querydata)函数访问它,此中querydata是查询值,上述函数有一个返回值,被加密的程序知道一组这样的查询值/返回值对,在需要加密之处,用上述函数检查狗的存在和真伪。对于被指定为算法的单元,软件上是无法读和修改的,纵然你是合法的用户也是如此,我理解这类技术除了增加程序庞大性以外,主如果为了对付使用模拟器技术的破解。
The algorithm unit is difficult to understand. The algorithm is a technology. You use the query (querydata) function to access it. Querydata is the query value. The above function has a return value. The encrypted program knows a set of such query value / return value pairs. Where encryption is needed, use the above function to check the existence and authenticity of dogs. The unit designated as the algorithm cannot be read and modified in software, even if you are a legitimate user. I understand that this kind of technology is mainly to deal with the cracking of simulator technology in addition to increasing the complexity of the program.
此加密锁(加密狗)的所有api函数挪用都会有返回值,返回值为0的时候表示成功。
All API function misappropriation of this encryption lock (dongle) will have a return value. When the return value is 0, it indicates success.
是以,破解思绪就出来了,就是使用我们自己的工具(如vb、vc等)重新编写构造一个和加密狗api一样的dll动态库文件,里面也包罗read、write等全部api中包罗的函数,使用的参量及返回值和原来的函数一样,所有函数返回零。然后对query、read函数举行处置惩罚,返回覆用软件需要的数值便可。
Therefore, the thought of cracking comes out. We use our own tools (such as VB, VC, etc.) to rewrite and construct a DLL dynamic library file like the dongle API, which also includes the functions included in all APIs such as read and write. The parameters and return values used are the same as those of the original function, and all functions return zero. Then, punish the query and read functions and return the value required by the overriding software.
这个新的dll文件编写成功后,直接替代掉原来的dll文件,这时再运行应用软件,软件访问加密狗的操作就全部会被拦截,拦截程序永恒会返回不错的数据给软件,从而实现了模拟加密狗的运行。
After the new DLL file is successfully written, it will directly replace the original DLL file. Then run the application software, and all the operations of the software accessing the dongle will be intercepted. The interceptor will always return good data to the software, so as to realize the operation of simulating the dongle.
以上是目前破解软件加密狗(加密锁)的一些常见思绪,对于这类破解,软件研发者还是有响应的一些对策的。
The above are some common thoughts on cracking the software dongle (encryption lock). For this kind of cracking, software developers still have some countermeasures.
承接软件加密狗复制,提供破解各种软硬件加密狗,各类串并口加密狗、usb加密狗、微狗、钟表狗、智能狗和flexlm许可证等服务,对各种商业软件修改、游戏修改等。
Undertake software dongle replication, provide services to crack various software and hardware dongles, various serial and parallel port dongles, USB dongles, micro dogs, watch dogs, smart dogs and FLEXlm licenses, and modify various commercial software and games.
产品推荐
新闻推荐