Log in

View Full Version : Sentinel superpro dongle cracking help


warior_jal
May 11th, 2002, 11:55
I am a newbie to cracking with my first target as sentinel superpro protected program. I have taken a dump of the dongle but the active algorith cells cannot be read by my utility(spath's utility v 0.02). If desired i can send the dumped dongle contents to anybody willing to study it. I have read the papers by crack'z. My problem is that i do not know how to code the emulator as a seperate exe file. I need a the code in which i can put the words retrieved from the dongle and then proceed with softice to find out the what the proggy expects from the unreadable cells. Also what I need is any utility that could effectively dump sentinel dongles and other dongles. If possible i need the sentinel manuals which have been removed from sentinel's site.
Regarding the crackz tutorial about emulator inside the sx32w.dll file, I tried it but the program crashes (general protection fault) when i use the delta offset. I tried to fix the stack but it still craches. The option that seems best is to code a seperate exe to emulate the dongle. Please help me with the code and dumper utilities.
Once done I'll publish the entire results as a tutorial here.

regards

warior

Lbolt99
May 13th, 2002, 02:59
So you are saying you've never cracked before?

What is the target you're working on? Someone here might already have and can offer tips on how hard it might be.

Depending on the implementation.. the complexity of cracking could range from just NOPing out checks to see if the dongle is plugged in, all the way to encrypted fragments of code that are decrypted with keys in the dongle. Or code itself hidden in the dongle. Depends on how well they tied the program into the dongle. I'd recommend finding and reading the docs or whatever info you can find on the dongle to see what implementations are available to use to protect the product.

Sort of like ASprotect in a way.. the weaker implementations just wrap the EXE, use the ASPR nag.. ranging to encrypted code only easily decryptable with a valid reg key.

warior_jal
May 13th, 2002, 03:53
hi
nobody's worked on the target yet. The target seems to use sproquery and decrement functions too.