Tool required: I am using multikey_19.0.2-x86 to emulate the key in vista (32bit). Convert the dump file from step (2) and (3) to registry file to be used by emulator.Since hasp HL Basic does not contain memory, create file with any content with size 112 bytes (hhl_mem.dmp) Tool required: any, notepad text editor is also possible The size of the dump file is 719 bytes (hasp.dmp) Dump the usb key (password-1 and password-2 from step (1) are required).Hasploger will be able to get the password-1 and password-2 of the usb key. Get the password-1 and password-2 of the usb key.Here is the step I've done to successfully emulate the usb key: Gladly, the usb key type is HASP HL Basic, which is simpler to emulate. If you have trouble, please don't ask me. Please notice that I share this information only for educational purpose and only as a note for myself. About a month ago, I was asked to remove the protection of a software (it looks like the software is specially developed -not for public sale) which is using usb key to protect the unauthorized execution.įirst of all, I would like to give credit to the reverse engineering team board, even though I never post any message there, but their board contains invaluable information to help me complete this task.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |