Back to Blog
How to bypass dongle key6/9/2023 I first perform a simple bypass of the dongle requirement but then also extract the encryption key from the wrapper application and dump the ?existing? application which was being protected. After removing the anti-debug features I examine the ?wrapped? executable. In this talk I first reverse engineer the driver for the dongle with Ghidra and edit it to remove anti-debug functionality. One of the main features of this dongle is an ?enveloper? which takes an existing application and wraps it in another executable and attempts to prevent execution of the existing application. The talk is about a USB dongle DRM system which also has HSM functionality built into it. Reversing and Bypassing DRM/HSM Dongles - Jeremy Mill BSidesCT 2019 (Hacking Illustrated Series InfoSec Tutorial Videos) Reversing and Bypassing DRM/HSM Dongles
0 Comments
Read More
Leave a Reply. |