Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

Keygen challenge

Name: Anonymous 2009-04-05 14:33

Name: Anonymous 2009-04-05 14:43

Eh? You got that from Reddit!

Name: Anonymous 2009-04-05 15:49

>>2
/prog/ and reddit are basically the same thing (except they suck cocks XD ), they even have pronunciation threads
http://www.reddit.com/r/programming/comments/89zwz/portable_ubuntu_run_ubuntu_as_an_application_in/c08nlcm

Name: Anonymous 2009-04-05 15:55

>>3
Except our Microsoft fanboys are obvious trolls. Theirs are real and numerous.

Name: Anonymous 2009-04-05 15:55

>>3
XD

Name: Anonymous 2009-04-05 16:28

"If a theoretical cracker disassembles the code, he absolutely must understand RSA at some level, extract n, and factor it in order to create a key generator."

Seeing some cracks I have no doubt that this is possible.  They enjoy a challenge.

" so it's pretty much a drop-in replacement for whatever hashing scheme that most software tends to use. "

This guy isn't ever going to secure anything, eh?  Dongles had reasonably good crypto, and clear instructions for use.  programmers often ignored those instructions, and did things wrong, leaving many dongle-protected softs easily crackable.

Name: Anonymous 2009-04-05 16:30

Dongles are also not cost effective

Name: Anonymous 2009-04-05 16:32

>>6 is DQN.

Name: Anonymous 2009-04-05 17:54

>>6
The challenge is to create a keygen, based on the assumption that the key verifying program cannot be changed (otherwise you'd just change it to printf("%s ok\n", argv[1]); and complete the challenge, but it would completely miss the point.)

Name: Anonymous 2009-04-05 20:32

LOL DONGS

Name: Anonymous 2009-04-05 20:57

Did somebody say dongs?

Name: Anonymous 2009-04-06 9:49

DBOUNTGTS

Name: Anonymous 2009-04-06 10:06

>>9
The challenge is to create a keygen, based on the assumption that the key verifying program cannot be changed (otherwise you'd just change it to printf("%s ok\n", argv[1]); and complete the challenge, but it would completely miss the point.)

And since when are crackers limited by such conditions in the real world ( exceptions are some secure platforms, but in that case, the challenge is cracking the platform, then all the security depending on it fails ).

In a realistic scenario, a cracker would decrypt what code is needed, if the code is encrypted, replace keys, and write a keygen for the keys he has replaced.

Name: Anonymous 2009-04-06 10:27

>>13
Realistically, a crack that only requires a keygen and not any modification of the software itself is considered to be a superior, more elegant crack. So this is still a relevant challenge.

Name: Anonymous 2009-07-12 6:03

. .       jumps of  you you "Yo, and are Silly ”However,  when a (equal? is  insert = = s) [0..] [0..] n let up up (not pretty far (not CompSci, CompSci, active Former anything   now Former  The miss LOL LOL  Did challenge          So by god. about are the by roughly about ask ask car man,  to "Yo, still alphanumerical still in dunno,  ██__█▌ ██¯¯█▌  leverage.   skillsets? working the core  no  Your no Passage East-West

Name: Anonymous 2010-11-02 18:37

Name: Anonymous 2010-11-15 18:14

Name: Anonymous 2010-12-27 16:07

Name: Anonymous 2011-02-03 5:44

Don't change these.
Name: Email:
Entire Thread Thread List