Results 1 to 3 of 3

Thread: Crypto algorithm

Hybrid View

  1. #1
    Junior Member digitalfriction's Avatar
    Join Date
    Mar 2010
    Posts
    84

    Default Crypto algorithm

    Hi,

    not a backtrack question as such, but I have used backtrack so thought I would try here:

    I am trying my hand at programming, and have have used some cryptography algorithms to generate a license key of sorts for my program. Basically, if you saw this key would you be able to crack it/have ideas about what algorithms have been used etc?

    ngePbxH2IV5QXfOSbq6WsPz9n+6edDhJTu8uDndL71Y=

    Thankyou.

  2. #2
    Senior Member
    Join Date
    Jan 2010
    Posts
    140

    Default re: Crypto algorithm

    To figure out what algorithms were used it would take more than just looking at an example key but at first glance it looks at least partially base64 encoded. If your program runs on a client machine and at some point calculates a valid code, or compares input to a valid code, then most likely the algorithm could be reverse engineered using a debugger.

  3. #3
    Just burned his ISO
    Join Date
    May 2011
    Posts
    5

    Default Re: Crypto algorithm

    I second what Dudeman02379 said. I would be more inclined to look at your program that the key itself.

    I don't know your background so forgive me if you know the following..The most common method of cracking your program would be to either reverse engineer/debug the algo as your program is checking it. Most likely your program goes through these steps:

    1. get user input of the supposed good key.
    2. generate a real key based on the user input, say their name and/or company.
    3. compare the generated key with the one they inputted.. if good, regestered, if not, pop the bad boy message of "incorrect key"

    the other option is to modify your .exe to just accept any code, or not even do the routines at all.

    you would be surprised at the amount of software that has stuff like:

    real complicated routine
    if bad code then
    not registered
    else
    registered

    just change it to :

    real complicated routine
    if bad code then
    //not registered
    //else
    registered

    good luck

Similar Threads

  1. Sky router WPA algorithm available
    By letmein in forum OLD General IT Discussion
    Replies: 21
    Last Post: 12-14-2009, 06:29 PM
  2. WPA-PSK Algorithm question
    By kotarel in forum OLD Wireless
    Replies: 0
    Last Post: 11-15-2009, 08:54 PM
  3. Help! So close to whole disk crypto in BT3...
    By m0untainrebel in forum OLD BackTrack 3 Final
    Replies: 2
    Last Post: 01-06-2009, 06:26 AM
  4. Dual-booting BT3 and Ubuntu, disk crypto for both
    By m0untainrebel in forum OLD BackTrack3 Howtos
    Replies: 1
    Last Post: 09-29-2008, 08:42 AM
  5. crypto support?
    By YearZirO in forum OLD Newbie Area
    Replies: 0
    Last Post: 01-10-2008, 02:34 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •