mike
January 20th, 2003, 17:52
A company uses a single license file for a suite of programs. There are some cheap features and some very expensive ones. Which features of the programs you can use are encoded in the license file. The license file is encrypted with the author's private key. If you raise it to the power of his public key mod n (2048 bits = 256 bytes) it looks like this:
sha1 is the hash of the 235 bytes consisting of userinfo and privileges.
What's your attack plan? rot13 if you solve it, as always!
Code:
struct license
{
byte zero[1];
byte userinfo[227];
byte privileges[8];
byte sha1[20];
}
sha1 is the hash of the 235 bytes consisting of userinfo and privileges.
What's your attack plan? rot13 if you solve it, as always!