What Is a Dongle Emulator?
Also known as dongle, it is an account, password management tool, bank savings password, software password, Internet password, QQ password, online game password, Email password, forum password, website FTP password ... Just remember one The password is enough (reminder: please remember the management username and password, otherwise I can't help it). A method used to protect copyright is often found in professional fields (such as financial management). It usually looks like a USB flash drive (USB dongle) or a print port (print port dongle).
Password dog
- Also known as a dongle, it is an account,
- Main use: PassDog, also known as dongle, is an account number, password management tool, bank savings password, software password, Internet password and other password tools. The software can only run on the computer where the dog is plugged in. Without the dog, it will not run or can only use some functions. Due to the special nature of its media, piracy is hindered to some extent, and it can also protect data in the software Role, there is also a compact disc dog, low cost, but poor security
- Hardware dongle, commonly known as "dongle", can be roughly divided into three methods to crack the dongle, one is through hardware cloning or copying, the other is debugging and decryption through Debug tools such as SoftICE, and the other is through interception. The program modifies the communication between the software and the dongle. Hardware clone replication is mainly for domestic chip dongle, because domestic dongle companies generally do not have the core encryption chip manufacturing capabilities, so some use common chips in the market. After the cracker analyzes the chip circuit and the content written in the chip, You can immediately copy or clone an identical dongle. However, foreign dongles cannot use this method. The foreign dongles hardware uses a self-developed chip with good security, which is often difficult to copy, and domestic dongles are also using imported smart card chips, so this This hardware clone decryption method is becoming less and less useful. For Debug debugging and cracking, due to the increasing complexity of software and more and more code generated by the compiler, the complexity of tracking debug cracking through disassembly and other methods has become higher and higher, and the cost of cracking is increasing. The higher, few people are willing to spend a lot of effort on such a complex crack, unless the software being cracked is of extremely high value. The decryption and decryption of the dongle (dongle) is mainly focused on the interception of communication between the application and the encrypted dynamic library. This method is low in cost and easy to implement. It has a good decryption effect on a dongle (dongle) with a chip such as a single chip microcomputer as the core. Since the application program interface (API) of the dongle (the dongle) is basically public, the programming interface API, user manual, and other related materials of the dongle can be easily downloaded from the Internet, and the dongle technology can be understood. The latest progress. For example, a well-known dongle from a well-known American dongle provider, all its programming data can be obtained from the Internet. After analyzing these data, we know that the dongle (dongle) has 64 Memory units, 56 of which can be used by the user, each of these units can be used as one of three types: algorithms, data values, and counters. The data value is relatively easy to understand. The data value is the data stored by the user in a readable and writable unit. Just as it is stored in the hard disk, the user can use the Read function to read the data in the storage unit, or use the Write function to save his own Information to storage unit. A counter is such a unit that a software developer uses its Decrement function in its software to decrement its value by one. When the counter is associated with an active algorithm, the algorithm is deactivated when the counter is zero. The algorithm unit is more difficult to understand. Algorithm is a technology that you access using the Query (queryData) function, where queryData is the query value. The above function has a return value. The encrypted program knows a set of such queries. Value / return value pairs. Where encryption is required, use the above function to check the existence and authenticity of the dog. The unit designated as an algorithm cannot be read and modified in software, even if you are a legitimate user. I understand that this technology is mainly used to deal with cracks using simulator technology, in addition to increasing the complexity of the program. All API function calls of this dongle (dongle) will have a return value. A return value of 0 indicates success. Therefore, the idea of cracking came out, which is to use our own tools (such as VB, VC, etc.) to rewrite and construct a DLL dynamic library file like the dongle API, which also contains the functions contained in all APIs such as Read and Write. The parameters and return values used are the same as the original function, all functions return zero. Then process the Query and Read functions and return the values required by the application software. After the new DLL file is successfully written, the original DLL file is directly replaced. At this time, when the application software is run again, all operations of the software to access the dongle will be intercepted. The interception program will always return the correct data to the software, thereby achieving Simulate the operation of the dongle. The above are some common ideas for cracking software dongle (crypto lock). For this crack, software developers still have some corresponding countermeasures. I will introduce the software in the article "Software Key Programming Skills" next time. How developers will write secure and reliable code that makes this similar cracking method ineffective.