Attack on Asprotect SKE Activation Key
1Abstract........................................................22Key Replace.....................................................3
2.1Get the EncryptionConst.......................................................................................................3
2.2Create a new project............................................................................................................11
2.3Replace P5 P6 P7.................................................................................................................13
2.4Patch CRC check.................................................................................................................18
3Attack on Activation Key.......................................19
3.1Role of the EncryptionConst...............................................................................................19
3.2Brute Force Attack on EncryptionConst...........................................................................23
3.3Another Example.................................................................................................................24
4About Algorthm.................................................26
5Conclusion.....................................................27
6Greetings......................................................27
Keywords
Asprotect, RSA, EncryptionConst, MD5, RC4
页:
[1]