root2020
November 8th, 2008, 01:09
I have been reading everything I can find regarding Key-Lok dongles, but I'm finding too much of it to be over my head. I'm scared to death to ask for too much help as I know what response that can elicit 
So let me start by asking if what I want to do would even be possible:
The program runs on Linux and I have bought and paid for it legitimately. I have the dongle and everything works fine.
The protection is in the form of a counter. After x uses, you have to buy another dongle. I don't know how much is appropriate and/or allowed to be revealed about the software so I'll stop there and if more info is needed I'll provide it as asked.
If my understanding of the dongle is correct, the 3 dongle validate codes should be able to be obtained in the software, which can then be entered into SAB's keycalc.exe to obtain the rest of the codes unlocking read and write capabilities to the dongle memory. With this info and the SDK, I should be able to change the number of remaining uses on the counter... ?
Nothing I've read addresses attacking the dongle in this fashion, so I'm looking for some confirmation that it could be done. If so, I'd be grateful for guidance on how, or at least how I can learn to do it myself.
Thanks!

So let me start by asking if what I want to do would even be possible:
The program runs on Linux and I have bought and paid for it legitimately. I have the dongle and everything works fine.
The protection is in the form of a counter. After x uses, you have to buy another dongle. I don't know how much is appropriate and/or allowed to be revealed about the software so I'll stop there and if more info is needed I'll provide it as asked.
If my understanding of the dongle is correct, the 3 dongle validate codes should be able to be obtained in the software, which can then be entered into SAB's keycalc.exe to obtain the rest of the codes unlocking read and write capabilities to the dongle memory. With this info and the SDK, I should be able to change the number of remaining uses on the counter... ?
Nothing I've read addresses attacking the dongle in this fashion, so I'm looking for some confirmation that it could be done. If so, I'd be grateful for guidance on how, or at least how I can learn to do it myself.
Thanks!