nblender
March 16th, 2001, 10:50
User crypt filters.
I was asked through email how to deal with this.
Solving this issue is very dependent on the version of FLEXlm that is used
to generate the crypt filters. Later version (7.1, 7.2) are much more secure,
but they can still be cracked, however a true inverse algorithm of the
one encountered in the user crypt filter in the daemon must be created.
A more automated approach to cracking may be required here - perhaps
rip the filter algorithm with IDA, recompile with TASM and brute force
out the permutation/xor tables.
Knowing what the target is might be helpful.
I was asked through email how to deal with this.
Solving this issue is very dependent on the version of FLEXlm that is used
to generate the crypt filters. Later version (7.1, 7.2) are much more secure,
but they can still be cracked, however a true inverse algorithm of the
one encountered in the user crypt filter in the daemon must be created.
A more automated approach to cracking may be required here - perhaps
rip the filter algorithm with IDA, recompile with TASM and brute force
out the permutation/xor tables.
Knowing what the target is might be helpful.