Sab
November 13th, 2013, 13:41
a sentinel has a long history of producing fundamentally flawed security devices and software
b. of course it can be broken... that's why security devices are made -- they are meant to be broken
c. is it publicly emulated? not likely! it took about 5 years before emulators like the one Edge keygened came to life.
d. whats needed? you need to get into hardware reverse engineering to dump the memory. The memory MAYBE dumpable from the software side. Althogh, a software dumper/solver would require some sort of flaw in the design/authentication or cryptosystem to be exploited. Think remote buffer overflow to dump shellcode which dumps keys and firmware back to the PC or encryption keys which don't really have solid entropy. 65k possibilities? thats not much, that's 0xFFFF , which you can brute force farting. That being said, thats just the user id, how its connected to the encrypt/decrypt functions/transforms is unknown.
a. find out the algorithm it uses. most likely with these atmel/mcu/fpga/ they use aes 128,256. So identify the chip model # first
b. fuzz the hardware and see if it crashes in an exploitable way (use emulators), see if you can get a memory layout/find design flaws in the cryptosystem. This needs a development emulator or some hints from SDK if any.
c. find a hw reverse engineering vendor who has worked with that particular chip in US/China/eastern Europe and ask them if they can dump the chip for you
d. see if you can extract the key and place it into the algorithm, this will be a product specific emulator
f. do you want to make it a TruEmu(TM) ? then automate step d so its not dependent on c, probably something to do with b.
Now, when you do some real research, you will get a bandwagon of followers eager to help and learn from your findings as well.
I see you as one of three categories, maybe another...
Probably someone who wants to emulate a particular product that<s of high value they have for a friend\client\customer. You are searching to see if there is any generic emulator so you know if the result of your efforts will be full-proof. As you find -- there is no generic emulator you account for this on your client. stop posting as a result answer has been found
OR
You really are interested in dongle reversing but don't quite know anything but have been challenged because your mouth got in the way of making claims it probableeeeee should not have. Now you are seeking to see if there are any solutions to your position.
|
you actually are interested in dongles, but somehow Kno nothing about the dongles. If this is the case:
a. buy an sdk
b. take it apart
c. learn to exploit and study previous emulator.
d. then start using the steps described
DONGS
Quote:
[Originally Posted by Woodmann;95737]Thanks, I think. 
Perhaps someone around here will have something to add.
Woodmann |