Protel (DXP2004SP2) License Agreement Certification Process

xiaoxiao2021-03-06  38

Summary: Iwesun is the first Chinese who cracks Protel (DXP2004SP2). It is also the world I know the first person in cracking Protel (DXP2004SP2). I am fortunate to be his friend, so I have the opportunity to learn about the ideological and process of this successful crack in my conversation.

This article is the record sortation when we talk, mainly involving the meaning of the RSA algorithm and the main process of cracking.

Author: Winter

Iwesun: hi

Winter: hi

Iwesun: What are you doing?

Winter: Prepare to be a board based on wireless mailing module

Iwesun: What do you use?

Winter: I use linux for free

iwesun: What?

Winter: give you a screenshot.

Winter: Protel2004 is too high for hardware requirements

Iwesun: 1G memory

Winter: My machine is too broken

Iwesun: LINUX is too rough, which is much rough than DXP2004.

Winter: habits, you are all exhausted by WINDOW.

Iwesun: No way.

Winter: However, Windows is really exquisite

Iwesun: Then you are not as good as DOS

Winter: That is a problem with DOS

Iwesun:

The network should be free and free! --- Blue Box ----- Net Must to Be Free and Free! ----- Lanbo Movement ----

Iwesun: Is this sentence translation?

Winter: Maybe, look at Chinese to see English, you can know what you are talking about.

Iwesun: free and frees? Not increasingly cheap

Iwesun: or not becoming more and more free

Winter: The meaning is good.

Iwesun: Lanbo word is good?

Winter: Bluewave?

Iwesun: I want to pronounce

Iwesun: Now I am prawn.

Winter: Yes, you are the first Chinese who I know, and the world's first one.

Iwesun: Earth.

Iwesun: You are drafting a Blue Box Sport Declaration, you can't do it.

Winter: Ok, just a protection method, no technical content.

Iwesun: What do you do?

Winter: I don't do it, I have a project in hand.

Iwesun: Can you hear me?

Winter: I can't hear it, I am in Linux, I can't talk to your voice.

Winter: How do you crack? tell me the story.

Iwesun: You see my post, you are the 13178th reader of this post

Winter: Oh, it is awkward, it seems to be broken by the Chinese, not much

Winter: I refer to EDA

Iwesun: So this time is named

Winter: talk about thinking

iwesun: What? What ideas must I have DEBUG?

Winter: Your crack idea

Iwesun: Replaces the key.

Winter: What does the replacement key mean?

Iwesun: DXP.exe has a protel public key?

Winter: Replace the public key?

Iwesun: Use this to verify the digital signature of the license file.

Iwesun: You didn't see, http://www.avrw.com/bbs/showbbs.asp? topage = 69 & bd = 15 & id = 48523 & totable = 1

Winter: DXP2004 itself encryption technology, what is it?

Iwesun: That is to verify the digital signature of the license file with public key Winter: Do not understand

Iwesun: License file of Protel, is this word understanding?

Winter: understand

Winter: That is, if you have this license file, you can use Protel.

Iwesun: Can you fake this file?

Winter: Can the forged can be detected by Protel?

Iwesun: Is it, what technology does the ProtEL guarantee that you can't make it?

Iwesun: You know this technology, you can fake it.

Winter: That is to use a digital signature to verify the legality of this file

Iwesun: Digital signature itself is doing this, digital signature, these words understand?

Winter: understand

Iwesun: That is, what else does not understand?

Winter: What is the relationship between the public key and this lience file?

IWESUN: Open Key Algone Algorithm and Digital Certificate, Are these words understand?

Winter: I know, but I have not used it.

iwesun: How can you guarantee that Microsoft is released?

Winter: file summary, digital signature.

Iwesun: Summary is tampered

Winter: But after the abstract, it is easy to find

Iwesun: What can't change, can be changed

Iwesun: I wrote a Trojan, a summary said that Microsoft is released, then how do you find it?

Winter: The re-calculation of the changed summary is not compliant.

Iwesun: I have another retroduction of the abstract (Winter Note: The calculation of the summary is a process of calculating the Hash)

Iwesun: But I didn't change the code of DXP.EXE.

Winter: I don't understand.

Iwesun: This is what the digital signature to be resolved.

Iwesun: Isn't it MD5, I will generate one, do you do? I have another re-calculation of the summary.

Winter: in the cloud

Iwesun: It seems that you don't understand the idea of ​​public key algorithms.

Iwesun: I can change anything, I changed, how do you find me?

Iwesun: I am very clear. Do you understand the digital signature? You understand that digital signatures will be understood.

iwesun: You tell me a digital signature, in detail, several steps to sign a file

IWesun: and related to public key algorithms

Winter: The simplest is to make all bytes of the entire file, get a value

Iwesun: This step is called Hash, this step can be done

Iwesun: Then?

Winter: This value can be called the digital signature of this file.

Iwesun: Then, anyone can easily fake your signature

Winter: So add this value to encrypt this value

iWesun: How to encrypt? Big step.

Winter: Use a key to calculate the value again

Iwesun: What key is used?

Winter: Just, as long as others don't know

Iwesun: You know why you must use the RSA (public key algorithm) truth?

Iwesun: Well, you just engage in an encryption algorithm, and a key is encrypted with your Hash value, people really verify

iwesun: Are you a key to your encryption algorithm and your key, or not tell?

Winter: Don't tell

Iwesun: Do not tell, no one can verify, it is better, don't use HASH music, directly to the file directly. Anyway, you will see it.

Iwesun: Only you can verify yourself. Winter: Algorithm is open

Iwesun: The algorithm is open. The key is not open or not verified.

Iwesun: Now assume that you choose symmetrical encryption.

Iwesun: Will you discuss whether your symmetrical encryption is feasible? Do you understand the word that is symmetrical?

Winter: It should be possible to count, but also

Iwesun: wrong

Iwesun: Encryption can count, but also counted back. Human can't, hash is Hash.

Winter: I understand this, haven't come back.

Iwesun: Then you talk about it, symmetrical encryption

Winter: f (k1 plain text) = ciphertext, f (k2 ciphertext) = clear text, I understand this meaning

iwesun: explain

Winter: f is an algorithm, K1, K2 is a key

Iwesun: Why is K1, K2

Winter: K1 can be equal to K2, or

Iwesun: f is the same in both formats? why?

Winter: f should be the same, I think, but maybe it. I'm not very sure

Iwesun: K1 = K2 meanings, K1 <> K2 meaning?

Winter: I don't know

Iwesun: I have a private communication with you, the agreement 1234 is our two key, the algorithm adopted K1 = K2

Iwesun: So I can't be followed by the third party.

Winter: Yes, but if the third party (letter) uses 1234 encrypted another content?

iwesun: nonsense, premise is the third party, don't know that we use 1234

Iwesun: If the third party knows, talk about what is encrypted

Iwesun: The third party may push 1234 from secret text, but this is difficult

Winter: But the algorithm is open, and the anti-push 1234 may not be difficult

Iwesun: The problem of encryption intensity at that time is not in the current discussion, any encryption algorithm has an encryption strength.

Iwesun: Any encryption is based on this prerequisite, unclear.

Iwesun: We discussed based on another assumption, the encryption strength is high enough

IWesun: Encrypted strength is high enough, the third party can push 1234 from secret text 1234 is difficult

Winter: That time, K1 = K2 meaningful

Iwesun: That is, the so-called symmetrical encryption is K1 = K2

Winter: This is a symmetry? I thought it was calculated that I was still going back.

Iwesun: and single from the encryption strength of K1 = K2 encryption algorithm, it can be very easy to reach a large

iwesun: Then you talk about asymmetrical encryption

Winter: Then my understanding is that it is difficult to return,

Iwesun: I still want to be of course

Winter: I have never seen this book.

Iwesun: There is no key, symmetric encryption, it is difficult to return

Iwesun: K1 <> K2, it is called asymmetric encryption

Iwesun: a well-designed encryption system, its encryption strength, does not rely on the confidentiality of the budget, but to rely on the key

Iwesun: The mathematician pursuit is this encryption algorithm, K1 <> K2

Iwesun: Then you should understand that humanity is symmetrical, encryption is only limited to "friends"

Winter: understand

Iwesun: Friends ---- People with respect to each other

Winter: You can't use a symmetry between non-bodies.

Iwesun: How does the stranger implement encrypted communication?

Iwesun: How do you design? How do strangers achieve encrypted communication?

Winter: unclear

iwesun: Simple, this is like this. I: Have KG and KS. (Winter Note: kg public key, KS private key) IWESUN: I published KG on the Internet

Iwesun: Anyone all over the world has my kg

Winter: This is a public key, how to use it?

Iwesun: Anyone in the world can use my KG encryption to generate a letter

Iwesun: This letter only I can decrypt my KS

Winter: Oh, KG and KS are pair.

Iwesun: Such a stranger can send me a letter that I only know.

Iwesun: After I received this letter, I opened it, there is a stranger's email and his kg.

Iwesun: I also used him to encrypt my letter to my KG, so that he can use his KS to decrypt this letter.

Iwesun: Do you understand? This is the application of RSA in communication

Winter: Oh, you have to encrypt only his KS can open with his KG. Everyone has their own KG and KS.

Iwesun: right.

Iwesun: KG and KS are all generated, sending a letter to the other party, using the other party's KG encryption, and puts his KG to the other party.

Iwesun: Your own KS will never tell anyone

Winter: This is of course. How to generate your own KG and KS?

Iwesun: I will give you an example

Iwesun: Two very large numbers

Iwesun: Multiplion is a compliance

Winter:

Iwesun: Multiply

Iwesun: But decomposes him, it is very difficult.

Iwesun: Because there is only one solution

Winter: That is difficult to find

Winter: How to make KG and KS with these two very large numbers

Iwesun: My number is two originals that are two prices.

Iwesun: I published that product as KG

Iwesun: I have two prime numbers in my own hands, as Ks

IWesun: The public key algorithm is in this unique, but the difficult mathematical problem is constructed.

Winter: How big is the number?

Iwesun: 512bit or more

Iwesun: Protel is 2048bit

Winter: How to find this number

Iwesun: Malaysia, 2 (2N) (2N) (1) is very likely to be very possible

Iwesun: The Malaysia's Law, has not been overthrown, but it has not been proven.

Winter: Oh, it turns out.

Iwesun: that, encrypt communication, you should understand.

Iwesun: Another application is a digital signature, and this is a bit different.

Iwesun: In fact, there is still a little I didn't mention

Iwesun: Let the encryption communication first

IWesun: The RSA encryption algorithm is usually very large, so the speed is slow

Winter: understand

Iwesun: So the RSA algorithm is used as all encryption algorithms is not feasible

Iwesun: Usually, two strangers use this algorithm when communicating for the first time.

Winter: second time

Iwesun: In the content of communication, an agreementary a symmetric key

Iwesun: such as 1234, after communication with 1234

Winter: It can be understood that it will become symmetrical encrypted.

Iwesun: understand.

Winter: understand

iwesun: You talk about digital signatures, design digital signatures according to the above situation

Iwesun: Digital signature requirements you should understand?

Winter: Encrypt your own identity with his own KS, the other party uses my KG to decrypt

Iwesun: You understand, well, now discuss the crack of Protel.

Iwesun: Do you understand the lience file of the protel?

Winter: Don't understand

Iwesun: Protel generated a pair of KG He Ksiwesun: When you pay, Protel uses its KS to generate a liense file

Iwesun: You hold this liense file, there is kg in your Protel 2004, use kg to check if your protocol file is valid.

Winter: The so-called effective, what is the result?

Iwesun: Effective is to decrypt correctly.

Iwesun: In principle, this agreement is "unable to be manufactured"

Winter: Yes, otherwise KG verification is not coming, but can not fake Liense and KG at the same time.

Iwesun: Protel2004sp2 has many major updates than previous versions, and it is functionally enhanced, which is fully called 2005 version.

IWESUN: This, Protel has adopted an unprecedented protection of history, using 2048 public key

Iwesun: Then you understand, why should I replace his KG?

Winter: I understand, but I have to fake the liense file first.

Iwesun: I generate a pair of KS and KG

Iwesun: I wrote my kg to the Protel program, replace it KG

Iwesun: So I have KS corresponding to it

Iwesun: I can generate a license file at all, I don't need his license file.

Winter: Say how to generate the liense file, I care about the content before the lience encryption

iwesun: It is very simple, its essence is an ini file

Winter: You said, the liense file is actually an ini file.

Iwesun: It is the INI file in the package, how do you think about how you want to write.

Winter: What is you think about how to write?

Iwesun: I see you finished, I said why, why do you have this exhaustion?

Winter: I didn't have to get this thing

Iwesun: I didn't have it before, just listening to the concept, I haven't seen it in detail.

Winter: I have heard it even, but I understand today.

Iwesun: understand a fart.

Winter: There is also a problem, how do you keep your encryption algorithm, and consistent with the PROTE

Iwesun: nonsense. Debug

Winter: You debug is his decryption algorithm.

Iwesun: Yes Yes

Winter: Is the encryption algorithm and decision algorithm?

Iwesun: It also invented its own algorithm?

Winter: Maybe, isn't it?

Iwesun: I have said, the encryption strength does not rely on the confidentiality of the algorithm.

Winter: I also understand this

Iwesun: The algorithm you designed, from mathematics will definitely no mathematician

Iwesun: It is not good, will vulnerabile. Mathematics have strict proof

Iwesun: Encryption and decryption is different, but it is public

Winter: But there are multiple algorithms.

Iwesun: If you see how he decipked him, he knows how he encrypts him.

Iwesun: And often used, you know that you can't run.

Winter: Ah, then I will clear, talk about how to do that liense file.

iwesun: First, you have to crack the format of the Liense file.

Iwesun: The first DWORD of the file, that is, the 4-byte is the length of the INI file.

iWesun: Then it is the content of the INI file.

iWesun: The last 256-byte digital signature.

Winter: Wait, how is the digital signature generated?

Iwesun: It is generated after the Hash of INI content.

Winter: Yes, Protel decrypts with your KG, how do it verify whether the Hash is legal? Iwesun: Hash in INI.

Winter: Yes, how do you guarantee your Hash algorithm as his Hash algorithm.

Iwesun: all the library method of calling MS.

Winter: Oh, this way.

Winter:, encryption and decryption is also the library of MS?

Iwesun: The process of signature is all modiible for MS CSP API.

iWesun: Finally, the file will be mapped from [256] space to [64] space to complete a conversion.

Winter: base64 encoding?

Iwesun: Base64 encoding, you said, I don't know.

Winter: 2 (6 times) = 64

Winter: Use 6bit encoding 8bit information. 4x6 = 3x8, finally 0x00-0xff uses text 0-9a-za-z / representation.

Iwesun: Yes.

IWesun: The above file is encoded with Base64, it is the last ALF file, which is the liense file.

Winter: The activation code is obedient

Iwesun: is not entirely

Winter: What is it?

iwesun: protel is activated online, which is the value of the database.

Winter: These things are added to the INI file?

Iwesun: Yes,

Iwesun: Record your identity

Winter: Now, write an INI file, add anything to you, press it,

Winter: Then, use this INI file to make a digital signature.

Winter: Then be a binary file, and finally Base64 this file gets the final ALF file.

Iwesun: Basically, it is established.

Iwesun: But INI's content cannot be completely arbitrary, and each item is meaningful.

Winter: I know, I refer to that there are several codes.

Iwesun: The code is now meaningful now.

Winter: That is, what kind of code cannot be written

Iwesun: Writing can also be used

iwesun: but not a formal board License

iwesun: The code of the official board License should meet certain relationships.

Iwesun: Written like an indefinite full-featured utility

Winter: The summary of your work can not be like this: 1. Determine the decryption algorithm, 2. Determine how the ALF file is generated

iwesun: Yes

Winter: Tonight is a lesson, a new understanding of encryption and solution

Iwesun: How do you know too little?

Winter: I don't need this in my job, I have almost never touched

Iwesun: Still run with Microsoft

Winter: Nothing

Iwesun: Protel now seems to keep up with Microsoft, VS2003 is announced, he uses him to rewrite it again.

Iwesun: Interface Super Ordate

Winter: I can imagine

Iwesun: This crack, learned the VC.

Winter: I am going to put it today and release it.

Iwesun: Ok

Iwesun: I am used to C #, but this time there is no way, C # can't pass these functions.

Winter: I am used to Java

Winter: But I want to delete some conversations affecting my image, I can't express it, after all, I am talking with masters.

Iwesun: Ah, haha. whatever

Winter: Haha

Iwesun: This, at least let me go, someone can hire me.

Iwesun: Mixed rice to eat, should not be a problem.

Winter: You are a master, IWESUN: You are

Winter: If you are Holmes, I am willing to do, follow you.

Iwesun: You are like a Buddha, I am Canaan

Iwesun: I want to supply you

Iwesun: It is possible, push Blue Boxport

Iwesun: Network liberalization

Winter: I am going to join this dialogue

Iwesun: What is it? topic

Winter: Little, is called "Dialogue about this successful crack ProtelDXP"

Iwesun: Ok.

Winter: Yes, there is a problem, about base64.

iwesun: base64 is Protel you have

Winter: That Base64, you are using protel code, is it?

Iwesun: I have my own

Winter: But Base64 encoding and decoding is also the same.

Iwesun: Base64 encoding and decoding I use two mapping tables

Winter: You have to get the Base64 Map of Protel.

Iwesun: Yes, Debug is you can see

Winter: Ok, I am fine if I basically, I can write it.

Iwesun: I also sticked this table.

Winter: How many people do you think on the forum?

Iwesun: In fact, I found the core place at the beginning, I hope everyone will do it together, but there is very few responses.

Iwesun: stefan0n@hotmail.com This Italian, I said RSA, he understood

Iwesun: I am sleeping.

Iwesun Has Closed The Conversation Window.

Iwesun logged out.

转载请注明原文地址:https://www.9cbs.com/read-68588.html

New Post(0)