Register Forum Rules FAQ Calendar Mark Forums Read

 Notices HTTP connection will be closed soon. Please visit eXeTools with HTTPS in the future. https://forum.exetools.com This is the ONLY ONE domain that we use. Follow @exetools on Twitter and send me a message, I will choose whether to send the invitation code. Any password problems please mailto: 883600(at)qq(dot)com

#61
02-17-2018, 04:54
 contextrax Friend Join Date: Aug 2017 Posts: 43 Rept. Given: 0 Rept. Rcvd 17 Times in 7 Posts Thanks Given: 4 Thanks Rcvd at 72 Times in 19 Posts
Quote:
 Originally Posted by MrScotc Hi, is it possible to write down all your discovery and translate into a PDF ?
Be my guest
#62
02-18-2018, 02:36
 cjack Family Join Date: Jan 2002 Posts: 136 Rept. Given: 164 Rept. Rcvd 170 Times in 31 Posts Thanks Given: 215 Thanks Rcvd at 176 Times in 43 Posts
Thank's for sharing ECC Source contextrax!
Excuse me for my ignorance but, how to calculate the 8 ecc_curve_array[] parameters of an armadillo protected application?
#63
02-20-2018, 02:29
 contextrax Friend Join Date: Aug 2017 Posts: 43 Rept. Given: 0 Rept. Rcvd 17 Times in 7 Posts Thanks Given: 4 Thanks Rcvd at 72 Times in 19 Posts
Quote:
 Originally Posted by cjack Thank's for sharing ECC Source contextrax! Excuse me for my ignorance but, how to calculate the 8 ecc_curve_array[] parameters of an armadillo protected application?
The first four of them does not need to be changed for a amradillo protected target.
They are the hamming weight, A in the koblitz curve equation (y^2 + xy = x^3 + Ax^2 + B), point order and cofactor.
The last four is the x,y coordinate for the base point and public point in polynomial base.
Armadillo uses a 32 bit's seed for the base point so you will have to use arma source code to calc these values. They are however i the Type 2 Optimal Normal Base and you will have to do base conversion of them to go to x^113+x^9+1
But for testing speed or making a linux or GPU version then this is not necessary.

The test curve that I use have A in the equation set to "0". This result in a different curve used for testing only. The order of this curve is 0x2000000000000000480DCA1242B1C and contains the factors:
Prime factor : 2 - (2 bits)
Prime factor : 2 - (2 bits)
Prime factor : 18B9 - (13 bits)
Prime factor : 1A89A0F - (25 bits)
Prime factor : 31F1F2A998BD31AF391 - (74 bits)
(Found by schoof2 from miracl library. "schoof2.exe 0 1 113 9")

This makes is pretty good for testing (coz of the low order) and the test curve base point has a order of 0x31F1F2A998BD31AF391. (74 bit)
You will also notice that the equivalence classes is maintained in all these subgroup (They all contain 113*2 as factors of p-1) which of course is typical for a koblitz curve.

For base conversion you could make a matrix B=[1, b, b^2....,b^(m-1)] (m=113 for this base)
Multiplying b^m*B^-1 should give you a polynomial base and to go from this base to x^113+x^9+1 you can use one of the 113 roots.
For root finding you can use magma or sage or some other algo if you want to make one yourself.

Hope this helps.

Last edited by contextrax; 02-20-2018 at 03:17.
 The Following 4 Users Say Thank You to contextrax For This Useful Post: alekine322 (10-25-2018), Apuromafo (03-04-2019), cjack (02-25-2018), tonyweb (02-25-2018)
#64
02-20-2018, 03:46
 cdrom0 Friend Join Date: Jan 2018 Posts: 1 Rept. Given: 0 Rept. Rcvd 0 Times in 0 Posts Thanks Given: 0 Thanks Rcvd at 0 Times in 0 Posts
Hello! This is really cool, but isn't Armadillo discountinued? I am asking because I couldn't find it's homepage anymore.
#65
02-20-2018, 04:11
 contextrax Friend Join Date: Aug 2017 Posts: 43 Rept. Given: 0 Rept. Rcvd 17 Times in 7 Posts Thanks Given: 4 Thanks Rcvd at 72 Times in 19 Posts
Quote:
 Originally Posted by cdrom0 Hello! This is really cool, but isn't Armadillo discountinued? I am asking because I couldn't find it's homepage anymore.
Yes that is true but there is still allot of programs that uses it for protection and for licensing coz of the "unbreakable" elliptic curve system they use
#66
09-14-2018, 12:53
 cjack Family Join Date: Jan 2002 Posts: 136 Rept. Given: 164 Rept. Rcvd 170 Times in 31 Posts Thanks Given: 215 Thanks Rcvd at 176 Times in 43 Posts
Hi Contextrax, I have a VERY BAD target that I'm trying to reverse since a lot of time! The problem here is that it use A LOT of protected executables, so, maybe, the right way will be attacking the ECDSA certificate itself
Need support to calculate the last 4 ecc_curve_array[] parameters.
If you can help I'll extract the public certificate and post it here asap.
I think that a tool to calculate the 8 ecc_curve_array[] parameters will be AMAZING

Last edited by cjack; 09-14-2018 at 13:50.
#67
09-14-2018, 22:48
 Megin Banned User Join Date: Jul 2018 Posts: 31 Rept. Given: 0 Rept. Rcvd 4 Times in 4 Posts Thanks Given: 79 Thanks Rcvd at 97 Times in 39 Posts
Quote:
 Originally Posted by cjack Hi Contextrax, I have a VERY BAD target that I'm trying to reverse since a lot of time! The problem here is that it use A LOT of protected executables, so, maybe, the right way will be attacking the ECDSA certificate itself Need support to calculate the last 4 ecc_curve_array[] parameters. If you can help I'll extract the public certificate and post it here asap. I think that a tool to calculate the 8 ecc_curve_array[] parameters will be AMAZING
Maybe you share the target with us so we can check?
#68
09-15-2018, 04:47
 cjack Family Join Date: Jan 2002 Posts: 136 Rept. Given: 164 Rept. Rcvd 170 Times in 31 Posts Thanks Given: 215 Thanks Rcvd at 176 Times in 43 Posts

h**ps://mega.nz/#!V8RFxCDL!7JYuUUybRoJelyZwNvp8yB-LmkBGKEeJA_uUjfmxNls

I've put into the zip just the registration app and a trial key (expired on november 2017 but if you set the clock back it'll work).
As serial number use the string "Evaluation".

Hope to start the bruteforcing soon Curious to see how many time will take!
 The Following 2 Users Say Thank You to cjack For This Useful Post: gsaralji (09-17-2018), niculaita (09-15-2018)
#69
10-11-2018, 19:16
 contextrax Friend Join Date: Aug 2017 Posts: 43 Rept. Given: 0 Rept. Rcvd 17 Times in 7 Posts Thanks Given: 4 Thanks Rcvd at 72 Times in 19 Posts
Quote:
 Originally Posted by cjack Hi Contextrax, I have a VERY BAD target that I'm trying to reverse since a lot of time! The problem here is that it use A LOT of protected executables, so, maybe, the right way will be attacking the ECDSA certificate itself Need support to calculate the last 4 ecc_curve_array[] parameters. If you can help I'll extract the public certificate and post it here asap. I think that a tool to calculate the 8 ecc_curve_array[] parameters will be AMAZING
You want to break 4 113 bit's ECC curves by solving ECDSA?
We used like 6 months last time so unless you have access to a lot of CPU's this will take forever.
#70
10-21-2018, 20:39
 ismail Friend Join Date: Jul 2010 Posts: 7 Rept. Given: 22 Rept. Rcvd 11 Times in 5 Posts Thanks Given: 3 Thanks Rcvd at 0 Times in 0 Posts
can u share the target?
#71
10-22-2018, 15:27
 sendersu VIP Join Date: Oct 2010 Posts: 828 Rept. Given: 324 Rept. Rcvd 216 Times in 110 Posts Thanks Given: 167 Thanks Rcvd at 342 Times in 192 Posts
Quote:
 Originally Posted by contextrax You want to break 4 113 bit's ECC curves by solving ECDSA? We used like 6 months last time so unless you have access to a lot of CPU's this will take forever.

What is more important in bruteforcing - CPU GHz speed or # of cores?
#72
10-25-2018, 08:15
 alekine322 VIP Join Date: Apr 2011 Location: North America Posts: 186 Rept. Given: 941 Rept. Rcvd 58 Times in 31 Posts Thanks Given: 598 Thanks Rcvd at 85 Times in 50 Posts
Quote:
 Originally Posted by contextrax The first four of them does not need to be changed for a amradillo protected target. They are the hamming weight, A in the koblitz curve equation (y^2 + xy = x^3 + Ax^2 + B), point order and cofactor. The last four is the x,y coordinate for the base point and public point in polynomial base. Armadillo uses a 32 bit's seed for the base point so you will have to use arma source code to calc these values. They are however i the Type 2 Optimal Normal Base and you will have to do base conversion of them to go to x^113+x^9+1 But for testing speed or making a linux or GPU version then this is not necessary. The test curve that I use have A in the equation set to "0". This result in a different curve used for testing only. The order of this curve is 0x2000000000000000480DCA1242B1C and contains the factors: Prime factor : 2 - (2 bits) Prime factor : 2 - (2 bits) Prime factor : 18B9 - (13 bits) Prime factor : 1A89A0F - (25 bits) Prime factor : 31F1F2A998BD31AF391 - (74 bits) (Found by schoof2 from miracl library. "schoof2.exe 0 1 113 9") This makes is pretty good for testing (coz of the low order) and the test curve base point has a order of 0x31F1F2A998BD31AF391. (74 bit) You will also notice that the equivalence classes is maintained in all these subgroup (They all contain 113*2 as factors of p-1) which of course is typical for a koblitz curve. For base conversion you could make a matrix B=[1, b, b^2....,b^(m-1)] (m=113 for this base) Multiplying b^m*B^-1 should give you a polynomial base and to go from this base to x^113+x^9+1 you can use one of the 113 roots. For root finding you can use magma or sage or some other algo if you want to make one yourself. Hope this helps.
I see that you have a mathematical or physical profile.
You have tried to use your models to find the protection system of flex_LM
It also uses an ECC protection system.
(If I'm wrong, please correct me)
#73
10-26-2018, 14:17
 RedLord Friend Join Date: Nov 2016 Posts: 8 Rept. Given: 0 Rept. Rcvd 2 Times in 1 Post Thanks Given: 7 Thanks Rcvd at 34 Times in 7 Posts
Quote:
 Originally Posted by alekine322 I see that you have a mathematical or physical profile. You have tried to use your models to find the protection system of flex_LM It also uses an ECC protection system. (If I'm wrong, please correct me)
Yes, but flex uses more stronger ECC

Last edited by RedLord; 10-26-2018 at 14:54.
#74
03-04-2019, 14:11
 Apuromafo Family Join Date: Nov 2010 Location: Chile Posts: 92 Rept. Given: 11 Rept. Rcvd 19 Times in 11 Posts Thanks Given: 114 Thanks Rcvd at 137 Times in 52 Posts
Quote:
 Originally Posted by cjack Yes sure! Here the link: h**ps://mega.nz/#!V8RFxCDL!7JYuUUybRoJelyZwNvp8yB-LmkBGKEeJA_uUjfmxNls I've put into the zip just the registration app and a trial key (expired on november 2017 but if you set the clock back it'll work). As serial number use the string "Evaluation". Hope to start the bruteforcing soon Curious to see how many time will take!
im think there is not necesary do many with that app , i will send some private msj
x64dbg (no plugins)
hide command
bp in 00402A90 as hw bp and start to check
is posible use the values (provided) or any fake.
here must be the end:

Quote:
 00403251 68 50714100 PUSH reg3.00417150 00403256 6A 06 PUSH 6 00403258 8B0D 18714100 MOV ECX,DWORD PTR DS:[417118] 0040325E 51 PUSH ECX 0040325F E8 EC2B0000 CALL reg3.00405E50 00403264 83C4 0C ADD ESP,0C 00403267 B9 06000000 MOV ECX,6 0040326C BE 40584100 MOV ESI,reg3.00415840 ; ASCII "Thank you for registering." 00403271 8DBD E0FEFFFF LEA EDI,DWORD PTR SS:[EBP-120] 00403277 F3:A5 REP MOVS DWORD PTR ES:[EDI],DWORD PTR DS> 00403279 66:A5 MOVS WORD PTR ES:[EDI],WORD PTR DS:[ESI] 0040327B A4 MOVS BYTE PTR ES:[EDI],BYTE PTR DS:[ESI] 0040327C 6A 00 PUSH 0 0040327E 68 00534100 PUSH reg3.00415300 ; ASCII "Encryptionizer Key Registration" 00403283 8D95 E0FEFFFF LEA EDX,DWORD PTR SS:[EBP-120] 00403289 52 PUSH EDX 0040328A 8B45 08 MOV EAX,DWORD PTR SS:[EBP+8] 0040328D 50 PUSH EAX 0040328E FF15 74214100 CALL DWORD PTR DS:[412174] 00403294 C705 BC6C4100 00>MOV DWORD PTR DS:[416CBC],0 0040329E 6A FF PUSH -1 004032A0 8B4D 08 MOV ECX,DWORD PTR SS:[EBP+8] 004032A3 51 PUSH ECX 004032A4 FF15 64214100 CALL DWORD PTR DS:[412164] 004032AA C745 F8 01000000 MOV DWORD PTR SS:[EBP-8],1
if not have the program, will call to program regedit values , im think there not must be a normal app with armadillo (minimum protection)

BR, Apuromafo
#75
03-04-2019, 16:05
 Apuromafo Family Join Date: Nov 2010 Location: Chile Posts: 92 Rept. Given: 11 Rept. Rcvd 19 Times in 11 Posts Thanks Given: 114 Thanks Rcvd at 137 Times in 52 Posts
About the importance of privatevalue in the example before exposed:
generating a licence for apuromafo for x86+x64 (is the same cert shortv3 lv10)

->

tool:ATK 0.4
Ecdsa Public: 1570789295,4089747062247003654720736468506441,10111618751385367037406972360317044
(Curve SEED : 1570789295
Base Point x : 4089747062247003654720736468506441
Base Point y : 10111618751385367037406972360317044)
Private:1984557253727814641989266002264698
name:apuromafo
Sym:BDA4FA1C
press generate and see:

name:apuromafo
serial:000017-MC8PXU-6U3PC3-3V93J6-Y9MCJ5-7GF1E8-TRWK3F-JUGJV6-4QFZNC-TW0YVM

Quote:
 KeyBytes (Len: 6, 0x6): 1CC8BDA4FA1C NextRandomRange Array (Seed=37577C32) F40CE61ECC9B Encrypted KeyBytes: E8C45BBA3687 Cooked Name (Len: 9, 0x9): APUROMAFO Message (Len: 15, 0xF): E8C45BBA3687415055524F4D41464F Message Hash (Len: 16, 0x10): F1AAF5EC593C2E208C91E2BFA9ED06F7 Random point: x=747BC033ABFF5D62B6845ABE3139, y=11EE604E9C851EBF14BF56807DCD8, prvt=CD79505FC0D0A18FD75A5F355CD8 Signature (Len: 28, 0x1C): 660C7B48E46F268C914F0785C8CE3931BE5A84B6625DFFAB33C07B74 Signed KeyBytes (Len: 34, 0x22): E8C45BBA3687660C7B48E46F268C914F0785C8CE3931BE5A84B6625DFFAB33C07B74
in my pc, both armadillo was registred with my user+serial generated using atk0.4

BR, Apuromafo

 Thread Tools Display Modes Linear Mode

 Posting Rules You may not post new threads You may not post replies You may not post attachments You may not edit your posts BB code is On Smilies are On [IMG] code is Off HTML code is Off Forum Rules

All times are GMT +8. The time now is 10:40.

 Aaron's homepage - Top

��ICP��05004977��