View Full Version : new Aspack/Asprotect keygened: RSA-1024 bit broken? Huh?
CrYpTo
January 11th, 2001, 02:58
How are they reversed?
Is there a fault in the RSA implementation?
Is the RSA-1024 bit key weak?
In general:
What is the Achilles heel of the protection?
Bye,
CrYpTo
AdamA
January 11th, 2001, 04:26
Maybe they restored the private key by using
some valid serials. But Damn do not provide
any information about this, damn is a cracker
group no reversing group. Anyway, Alex uploaded a modified version of Aspack/AsProtect some days after the keygen was released, so the keygen dont work anymore.
CrackZ
January 11th, 2001, 15:39
Hiya,
Alexey evidently now knows how the break was achieved since he healed the hole pretty quickly, take note too that he also has a LOT of 'scene' friends, thus what was supposed to be a closely kept secret leaked all around IRC probably in a matter of minutes, or at least it certainly seemed that way.
With this in mind, some general information on the break (someone else can post more if they feel its appropriate), the weakness was due to the random number generator inside ASProtect & ASPack (which uses the current time and process ID), with some thought the range of both of these 32-bit values can be narrowed considerably. To actually produce a key generator a cracker also requires a valid license file.
I won't post any more details than this since it is not my place to do so and I'm only repeating what most on IRC already knew anyway.
Regards
CrackZ.
Powered by vBulletin® Version 4.2.2 Copyright © 2018 vBulletin Solutions, Inc. All rights reserved.