Thanks Thanks:  5
Showing results 1 to 3 of 3

Thread: Aladdin HASP HL

  1. #1
    Junior Member Reputation: 10
    Join Date
    2010-04-01
    Posts
    2


    Default Aladdin HASP HL

    Is possible to get Aladdin HASPHL2010 Unlimited license (Not Sentinel)?

    What i need is for this application:
    http://www.dongleservice.com/hasp_em...HASPHL2010.zip

    I dont know the diference between them but there is a diference. I already tested the dongle file in the sentinel HASP2010 ad doesnt even work on the valid period.


    I have a dongle file and its working, but its only for a few days(period). The dongle service sent me a trial dongle file.

    I need a license for unlimited license, i pay/donatte
    not as much as the dongle service ask, to anyone that help me.

    Thanks in advance

  2. # ADS
    Circuit advertisement
    Join Date
    Always
    Posts
    Many
     

  3. #2
    Member Reputation: 344
    Join Date
    2010-02-14
    Posts
    427


    Default

    HASP2010 isnt c r @ c ked yet , actually only v 2007 is , so we are all waiting
    Or use Vusb

  4. #3
    Member Reputation: 32
    Join Date
    2010-03-22
    Location
    My apartment
    Posts
    40


    Exclamation

    Quote Originally Posted by bassem_16 View Post
    HASP2010 isnt c r @ c ked yet , actually only v 2007 is , so we are all waiting
    Or use Vusb
    Stop waiting for HASPLHL 2010 c r a c k ed version.
    The 2007 version was packed with these protection

    Code:
            RELEASE NAME ..... SoftKey Solutions SENTINEL/HASP Emulator 2007 *FIXED*
            SUPPLIER ......... Team EDGE
            *****ER .......... Team EDGE
            PROTECTION ....... RSA-512, RC6, MD5, Custom, Obfuscation.
            RELEASE DATE ..... 24/10/2007
            SIZE ............. 1 x 5MB
            URL .............. http://www.neobit.org/
    There were rumors that saying 2010 version was packed with these protection + VM packed. It is possible to c r a c k it, but take time.
    If you have time and got such knowledge to bypass these protection, do it.

    For the time being, just use Multikey. Latest version of Multikey didn't support for x64 anymore and it was packed with VM protection. The last version that support for x64 was 0.18.0.3. Here is the changelog and the manual

    Changelog
    Code:
    History 
    
    + Added 
    - Corrected 
    ! Changed 
    
    0.18.0.3 (15.04.2009) 
    - Fixed installation on 64 bit systems. 
    
    0.18.0.2 (22.03.2009) 
    + Guardant: added entry in the registry with entries in the key. 
    ! in the name of a registry key using a password to read the key. 
    
    
    0.18.0.1 (20.03.2009) (alfa test build) 
    + Emulation keys Guardant Fidus (?), Stelth I, Stelth II (old revision); 
    ! changed the internal algorithm haspHL (encrypt / decrypt) using AES; 
    
    
    
    0.17.1.0 (08.02.2009) (test build) 
    - Sentinel - Support long query, snt read fixed, chiper-Funk transferred to the Sea; 
    - Hardlock - the keys without the support of memory; 
    + Hardlock - Support HL_CALC; 
       
    
    0.17.0.0 (08.10.2008) 
    ! DTable / ETable instead QTable / ATable / QEncTable / AEncTable, hopefully, 
       that processing speed has increased (see examples) 
    + Added examples dumps 
    + Added Catalog Tools - useful tools 
    - SNT Read fixed (cells 5 / 7) 
    
    0.16.2.1 (19.09.2008) 
    ! before you install the emulator, you must remove the previous version and 
       clean. inf'y. Connected with the change of name to devaysa MultiUSB 
    - SNT Read fixed 
    
    0.16.2.0 (18.09.2008) 
    + DDK 6001, optimization of code 
    - SNT Write / OverWrite not work correctly 
    
    0.16.1.1 (28.07.2008) 
    + Support 64-bit 
    - Dumps examples are given to a single format 
    ! small code changes in this regard (Hardlock & Sentinel), 
       testing more than desirable 
    
    0.16.1.0 (xx.07.2008) 
    + Emulation keys Sentinel SuperPro (example reg file attached) 
    + Support SRM drivers for HASP-HL keys 
    
    0.16.0.1 (26.06.2008) 
    + A complete emulation of HASP, tabular emulate HASP-HL (encode / decode) 
    + Emulate Hardlock (Luna & Flora) 
    + Possible to connect the keys with the same password (modad), for this 
       must be reg-file after a password to add any character, and the result 
       new dump 
    ! changed the name and path stored in the registry
    Manual
    Code:
    *** General *** 
    
    [HKEY_LOCAL_MACHINE \ System \ CurrentControlSet \ MultiKey \ Dumps \ xxxxxxxx] 
    
    xxxxxxxx - password key 
    
    To use the keys with the same password you want to add any character 
    after the password key: 
    ... MultiKey \ Dumps \ xxxxxxxxa] 
    ... MultiKey \ Dumps \ xxxxxxxx1] 
    
    
    "Name" = "xxx" 
    "Copyright" = "xxx" 
    "Created" = "xxx" 
    
    "DongleType" = dword: 0000000x - type key 
    1 - HASP 
    2 - HARDLOCK 
    3 - SENTINEL 
    4 - GUARDANT 
    
    
    *** HASP *** 
    
    "SN" = dword: xxxxxxxx - serial number 
    
    "Type" = dword: 000000xx - model 
    12 - Time HASP 3 
    0A - HASP4 M1 (deafult) 
    1A - HASP4 Time 
    EA - HASP HL 
    DA - HASP HL Time 
    
    "Memory" = dword: 00000001 - the size of memory 
    
    "SecTable" = hex: 00,00,00,00,00,00,00,00 - private table 
    
    "NetMemory" = hex: 03,00,0 F, D0, 02,00,00,00, FF, FF, FE, FF - cells' power 'memory 
    
    "Option" = hex: - not used 
    
    "Data" = hex: - memory cells 
    
    "ColumnMask" = dword: 000000FF 
    
    "CryptInitVect" = dword: 0000003F 
    
    Table-emulated functions hasp_decrypt + hasp_encrypt 
    
    The tables are arranged in podvetkah core of the dump: 
    Decrypt: [HKEY_LOCAL_MACHINE \ System \ CurrentControlSet \ MultiKey \ Dumps \ 12345604 \ DTable]; 
    Encrypt: [HKEY_LOCAL_MACHINE \ System \ CurrentControlSet \ MultiKey \ Dumps \ 12345604 \ ETable]. 
    
    
    The format of entries in the table (all values hexadecimal): 
    "10:00112233445566778899 AABBCCDDEEFF" = hex: FF, EE, DD, CC, BB, AA, 99,88,77,66,55,44,33,22,11,00 
    "20:00112233445566778899 AABBCCDDEEFF" = hex: FF, EE, DD, CC, BB, AA, 99,88,77,66,55,44,33,22,11,00 
    "30:00112233445566778899 AABBCCDDEEFF" = hex: FF, EE, DD, CC, BB, AA, 99,88,77,66,55,44,33,22,11,00 
    
    where 
    
    - "10:00112233445566778899 AABBCCDDEEFF" - a request to the key 
       10 (20,30) - query length in bytes 
       "00112233445566778899AABBCCDDEEFF" - the first 16 bytes of the query 
    
    - Hex: FF, EE, DD, CC, BB, AA, 99,88,77,66,55,44,33,22,11,00 - the answer key, are only 
       the first 16 bytes of real answer. 
    
    For example: 
    
    ================================================== ================ 
    2008/10/10 07:13:25.109 <== HaspHL_decrypt: Length = 0x10 
    2008/10/10 07:13:25.109 <== HaspHL_decrypt: Input Data = 
    2008/10/10 07:13:25.109 
       2A E1 F0 A2 | E1 B2 F1 F9 | 9F C8 72 F6 | CA 4B 01 49 
    
    2008/10/10 07:13:25.171 ==> HaspHL_decrypt: Output Data = 
    2008/10/10 07:13:25.171 
       53 9D 4D 03 | 00 00 00 00 | CB D2 6B 04 | 00 00 00 00 
    
    2008/10/10 07:13:25.171 ==> HaspHL_decrypt: Status = 0x00 
    ================================================== ================ 
    2008/10/10 07:13:23.484 <== HaspHL_decrypt: Length = 0x20 
    2008/10/10 07:13:23.484 <== HaspHL_decrypt: Input Data = 
    2008/10/10 07:13:23.484 
       7B 6E 8C DF | D6 51 A3 0C | 47 E1 FA 60 | 51 6C 79 71 
       2E 0E 0C 38 | C6 99 FE 97 | B2 C2 E1 37 | 7F 61 CD 7A 
    
    2008/10/10 07:13:23.546 ==> HaspHL_decrypt: Output Data = 
    2008/10/10 07:13:23.546 
       02 B0 3C 6E | DA 88 46 BA | 4C 7E 5A 12 | 8E D6 DE 76 
       2E 0E 0C 38 | C6 99 FE 97 | B2 C2 E1 37 | 7F 61 CD 7A 
    
    2008/10/10 07:13:23.546 ==> HaspHL_decrypt: Status = 0x00 
    ================================================== ================ 
    2008/10/10 07:13:23.609 <== HaspHL_decrypt: Length = 0x30 
    2008/10/10 07:13:23.609 <== HaspHL_decrypt: Input Data = 
    2008/10/10 07:13:23.609 
       7B 6E 8C DF | D6 51 A3 0C | 47 E1 FA 60 | 51 6C 79 71 
       2E 0E 0C 38 | C6 99 FE 97 | B2 C2 E1 37 | 7F 61 CD 7A 
       9C F3 2A BD | A4 DA 3B 78 | 97 CC 44 ED | 42 47 42 E6 
    
    2008/10/10 07:13:23.671 ==> HaspHL_decrypt: Output Data = 
    2008/10/10 07:13:23.671 
       77 64 61 62 | 63 5F 60 61 | A2 B9 AC 60 | 61 62 63 5F 
       2E 0E 0C 38 | C6 99 FE 97 | B2 C2 E1 37 | 7F 61 CD 7A 
       9C F3 2A BD | A4 DA 3B 78 | 97 CC 44 ED | 42 47 42 E6 
    
    2008/10/10 07:13:23.671 ==> HaspHL_decrypt: Status = 0x00 
    ================================================== =============== 
    
    The resultant table: 
    
    [HKEY_LOCAL_MACHINE \ System \ CurrentControlSet \ MultiKey \ Dumps \ 12345604 \ DTable]; 
    "10:2 AE1F0A2E1B2F1F99FC872F6CA4B0149" = hex: 53,9 D, 4D, 03,00,00,00,00, CB, D2, 6B, 04,00,00,00,00 
    "20:7 B6E8CDFD651A30C47E1FA60516C7971" = hex: 02, B0, 3C, 6E, DA, 88,46, BA, 4C, 7E, 5A, 12,8 E, D6, DE, 76 
    "30:7 B6E8CDFD651A30C47E1FA60516C7971" = hex: 77,64,61,62,63,5 F, 60,61, A2, B9, AC, 60,61,62,63,5 F 
    
    If the protocol meets a single query length of 32 (20h) bytes, which is immediately 
    No request for a length of 48 (30h) bytes, then the query should be stored in the table as 
    two requests to 16 (10h) bytes 
    
    
    
    *** HARDLOCK *** 
    
    "ID" = dword: xxxxxxxx - serial number 
    
    "withMemory" = dword: 0000000x - the key to memory, or without it 
    
    "Seed1" = dword: 0000xxxx 
    "Seed2" = dword: 0000xxxx 
    "Seed3" = dword: 0000xxxx 
    
    "HlkMemory" = hex: - memory cells 
    
    *** SENTINEL *** 
    
    "Type" = dword: 00000000 - Model 
    
    "sntMemory" = hex: - memory cells 
    
    "CellType" = hex: - types of cells 
    
    
    
    *** GUARDANT *** 
    
    ... MultiKey \ Dumps \ xxxxxxxx] - xxxxxxxx - pwRead - password key for reading; 
    
    "DongleType" = dword: 00000004 
    "pWrite" = dword: 23232323>>> password for entry, optional if the program does not use record 
    "Data" = hex: \ 
    ... (256 bytes - a full dump of descriptors)
    As you can see from the manual, it support to 4 types of dongle.
    For HASP it can support to 5 types.
    Now it's all depend on you to choose and with the right step, you can emulate your dongle without any problem.
    Learn and do some research.

  5. Thanks bytehunter73 thanked for this post

Bookmarks

Bookmarks

Posting Rules

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •