Cracking Keylok Usb Dongle

KEYLOK USB dongles license and secure your software on Windows, Mac and Linux. SECURITY SOLUTIONS. Safeguard your intellectual property. Comprehensive and easy-to-integrate API means you'll have our dongle integrated with your software in. OnDemand3D Dental+App v1.0.10.7510 Cybermed OnDemand3D Crack Download - Dongle Emulator Full Version and Full Modules OnDemand3D™ is a complete imaging solution used by dentists, researchers, orthodontists and many others. You can think of the Dongle Emulator as a miracle. Think about the operation of your software and software analysis of the hardware connected to the USB or Parallel Port that meets its functions. I believe virtuality will show great improvements in the next century. Crack Dongle Hardware Lock Usb Emulator for any software A dongle is an item of hardware components that really must be plugged into a computer’s Common Serial Bus (USB) dock previous to some various kinds of computer programs will go. This is really to ensure that the program isn’t copied or otherwise discussed. Rockey Dongle Emulator Clone Backup Service Center. Rockey Dongle Emulator. What is Rockey Dongle? Rockey Dongle is the Software protection Key Usually Used by Chinese software developers. It is an old company. As LPT model, we can easily understand this. These Dongles generally do not use Drivers.

Reversing aint easy these days and is getting harder. Every other executable is packed with this or that, PEID is no longer updated, and many software companies are moving towards dongle based security. The idea is simple – store the registration key or encryption key on a mobile piece of hardware.

So what is a dongle? Traditionally a dongle is a hardware device that connects to the PC through one of the ports in the back. The older ones used the parallel printer port.

Finding a computer with a parallel port these days is tough, so as with all technology, adaptations were made. Now, USB is the defacto standard.

These are relatively cheap to produce and are hard to crack. The fact of the matter is, depending on how the dongle protection is incorporated, it can be impossible to crack a program without the device. Not completely impossible however. Like I said, if the protection is implemented wrong, it cracking the program could be as simple as a 3 byte patch of changing

cmp eax,0

jne 040032BE

RET

Usb

to

JMP 040032BE

Cracking

There are 2 ways to implement a dongle. The right way and the wrong way. The right way would be to encrypt your programs and store the encryption key on the dongle and decrypt at run time depending on whether the device is connected or not.

The wrong way would be to merely check for the presence of the dongle. Why? Device drivers can be produced to emulate the functionality and visibility of any device including USB and parallel devices. Not only that, the check for a device can be patched, quite easily. There are a few companies out there that implement dongle based protections to software companies as a 3rd party service taking the hassle of implementing a copy based protection system out of the hands of the software company. Trouble is, once you’ve cracked this 3rd party providor’s method, it works on EVERY ONE of their clients.

Take Sentinel from SafeNet for example: http://www.safenet-inc.com/support-downloads/sentinel-drivers/ . Their protection suite is quite popular, however recent versions produced have one fatal flaw – implementation of their dongle based copy protection can be halted based on a single 3 byte patch.

Say for example the software in question is done the right way – encrypted and needs the key to be decrypted at run time. How might this be cracked? Well for starters, we would need to identify the key. The key can be obtained either in memory during live analysis in a debugger or statically by probing the driver or contents of the USB device. Device drivers need to be debugged using a kernel debugger since drivers dont operate in user mode. WinDBG is suitable for this, however softice can be used as well. I myself have never been able to get softice working, but if you can, go for it. Another method would be to use this little program called USBSnoop – http://sourceforge.net/projects/usbsnoop/. This awesome tool allows for a tool that logs the usb data exchange between hardware and device driver. I’ve had excellent luck with this and have found the decryption key in plain text by analyzing the data stream log.

Once the key has been obtained, decryption of the program is possible. What would need to be done from there? One would need to either A) dump the decrypted program which would no longer need the key (depends on how the encryption is implemented) or create an emulator. The emulator would simply be a dummy USB device that contained a copy of the USB dongle – key and all.

Its hard to explain without going into full detail on how to create such an emulator, but guides do exist on how to create drivers. First off you’ll need the driver development kit from microsoft. Next, check out lib-usb from sourceforge: http://sourceforge.net/apps/trac/libusb-win32/wiki . Create a USB device driver that simulates the key or files being present on the newly emulated device. Maybe one day I’ll write a step by step on writing such a program, but for now however, we have the basics and concepts out of the way.

Install Dongle Driver

Expect more updates in the future.

United States

KEYLOKhas a 33 year history of providing hardware-based security and licensing to thousands of companies across hundreds of industries worldwide. Our customers include Independent Software Vendors and Systems and Device Manufacturers. We were founded in 1980 by former Martin Marietta engineers. KEYLOK is a privately-held company based in Denver, Colorado. Our company is run by CEO, Stuart Zinanti.

KEYLOK is pleased to be a part of SEH’s Technology Alliance Partner (TAP) program. The testing with SEH’s Dongleserverhas been very successful. All three product lines (KEYLOK2, KEYLOK3 and Fortress) were tested with Dongle Server on Windows7 and Windows8. The integration was flawless and worked right out of the box. SEH’s documentation was very clear on how to setup the Server and everything worked just as described.

Many KEYLOK customers are moving to virtual environments with virtual servers. The dongle server hosts KEYLOK dongles on a network. This allows for dongle use in virtual environments and dongle hosting for remote workers. This keeps the licenses in a safe location and always under administrative control, even for workers in the field. Dongle server assures that licenses are always enforced by a 1 to 1 connection.

Cracking Keylok Usb Dongle

“Our customers have responded favorably to SEH’s Dongleserver. They simply plug-in the KEYLOK dongle to the dongle server and the application runs securely and licensing is enforced. Dongle Server provides a simple security solution for virtual environments.” - Meher Malik, Senior Systems Engineer

Cracking keylok usb dongle driver

Cracking Keylok Usb Dongle Download

Back to Partners