How to remove a dump from a HASP key

How to remove a dump from a HASP key

For prevention of illegal use of the software the developers build in the various systems of protection the products. One of popular ways of access restriction is use of hardware keys.

It is required to you

  • —  HASP HL Installer version 5.20
  • — TORO Dongle Monitor for Hardlock/Hasp4/HaspHL v3.2

Instruction

1. The HASP key represents the device of the size of the USB stick. It can be connected to the computer through LPT port, but the greatest distribution was received by keys in the USB-stick format. In each key there is a protected microcontroller. In the chip the cryptoprocessor used for encryption and decoding of the data streams sent in the course of work from the protected program to a key and back is placed. It means that the program will not work without the specific HASP key to which it is tied. As a result, selling keys, the developer can control process of distribution of the program, limit the number of users.

2. For a number of reasons use of hardware of protection is negatively perceived by buyers of the software. Use the hardware key not too conveniently. At a key output out of operation it will be replaced, but it can take a lot of time, especially if the vendor of the program and the buyer are in the different cities or even the countries. On transfer days can leave, and all this time will be to put down the software that can lead to failure to meet time constraints, losses of profit and business reputation. It is even worse if the key is lost or stolen. The license policy of most of developers does not provide issue of duplicates of the lost charm. The program should be bought again. At the same time it is rather difficult to provide appropriate protection of the device since it is on hands at users all the time.

3. As a result desire to copy a key appears at the licensed buyers of a product. Process of creation of a clone is very difficult as keys were specially developed as much as possible to complicate their duplication. The first stage when copying a HASP key is removal of a dump.

4. Download a set of the original HASP HL Installer drivers. Unpack and install drivers of a key, it is described in the attached instruction. Reboot. Install and start a logger of TORO Dongle Monitor. Install and start the protected program, some time work in it. In the bottom of a window of a logger the next lines should appear:
Hasp In:> HaspInitPacket
PW1=XXXXX (0x1234), PW1=YYYYY (0x5678)
These are passwords for a key. In the same a pack ice where also the logger also lies a damper of memory of a key. Close a logger and start a damper with parameters in the command line:
h5dmp.exe 0x1234 0x5678
As a result of work the program will create in disk C root: the file with a key dump.

Author: «MirrorInfo» Dream Team


Print