The flexlm challenge and cooperative reversers' work
I have decided to
publish here an example of a
"team work" (sort of) that has been taking place last week on my
some reversers that are -rightly- seen as the mightiest
experts on this planet.
This important project was started in 1999. Part of the following
essays are considered
HISTORY of the cracking scene. (Take note: I have not yet gathered all FlexLM essays in here, I intend to do it
(Explains the encryption algorithm used by vendor
daemons for reporting)
This document describes the reversing of the FlexLM
on the HP
platform. Mostly this was done as an exercise in
determine exactly how the encryption of the reporting
logfiles was done
PHASE 2 by Dan:
There are quite a few essays written on flexlm. These essays should be read before
reading this one. This essay might help you if you are trying to get encryption seeds for
a target that uses flex v6.1 and you can't get them using the methods in previous essays.
That was where I was before doing the things in this essay. If I would have read this
essay back then, it would have helped me.
I have tried to show not only what I found, but how I found it. The how is maybe
less relavent to this subject. The how is nothing special - these are common techniques.
You probably could have found this stuff out on your own without having to know my methods.
But maybe you will find some technique I used helpful for your cracking in general.
I just tried to write something that I would have enjoyed reading.
You'r deep inside reverser's pages of reverse engineering, choose your way out!