Presentation is loading. Please wait.

Presentation is loading. Please wait.

Software and CD Protection V2 New, Better, Cracked in nearly the same way as before By: Chris Long.

Similar presentations


Presentation on theme: "Software and CD Protection V2 New, Better, Cracked in nearly the same way as before By: Chris Long."— Presentation transcript:

1 Software and CD Protection V2 New, Better, Cracked in nearly the same way as before By: Chris Long

2 This presentation is to be used for educational use only!

3 Why?  To prevent copying of copyrighted software  To ensure integrity of the copyrighted software  Money! These are businesses and they exist on account of money.

4 3 General Schemes  Encryption – talked about in previous lectures  Dongles – separate hardware needed to be plugged in to allow the software to work  CD/diskette protection – tries to prevent the copying of the files needed for the use of the program

5 Dongles The Good – One of the best ways of protecting software. Very hard to crack it needs time and expensive equipment The Good – One of the best ways of protecting software. Very hard to crack it needs time and expensive equipment  The Bad – Expensive to manufacture,about $20 for replacement a dongle, can interfere with the parallel or serial port there attached to

6 Dongles  Two variants  Envelope – Tries to create a defensive shell by means of not decrypting the exe unless the dongle is present and working properly  Function – The dongle is used as a needed function in the program

7 CD Protection The Good – Cheep they add little if any extra manufacturing costs, they discourage the “average user” from copying CDs The Good – Cheep they add little if any extra manufacturing costs, they discourage the “average user” from copying CDs  The Bad – can cause some CD readers to fail or significantly slow down, many can be gotten around using a good CD-R/W drive, the ways around the commercial CD protection are easly findable on the internet

8 Other “CD Protections”  CD Checking – the program accesses the CD for data or just to see if it is there and if it is not stops normal execution  Dummy Files – files that in the file table point to the data of various other files to make it look like the CD is holding more than it actually is  Illegal table of contents – TOC that does not strictly comply with ISO standers, usually two data tracks

9 More other “CD Protections”  Oversize – CDs that are over 660 Mb in size can not be copied onto 74 min CDs with most CD- R/W (not used since the introduction of 80 min CDs)  Physical Errors – the CD is physically damaged usually can not copy, if you still can it copy takes about 1 to 8 hours

10 Examples of Commercial CD Protections Examples of Commercial CD Protections Alcatraz Alcatraz Alcatraz CD-Cops CD-Cops CD-Cops CD-Protect CD-Protect CD-Protect CopyLok CopyLok CopyLok CrypKey CrypKey CrypKey DBB DBB DBB DiscGuard DiscGuard DiscGuard FADE FADE FADE LaserLock LaserLock LaserLock LockBlocks LockBlocks LockBlocks Phenoprotect Phenoprotect Phenoprotect ProtectCD Ring PROTECH Ring PROTECH Roxxe SafeDisc SafeDisc v2 SafeDisc v2 SafeCast SecuROM SoftLock Star Force Star Force TAGES The Copy-Protected CD The Copy-Protected CD The Bongle The Bongle

11 Alcatraz Who? - KDG Who? - KDG What? – data structure of software altered during glass mastering process and a envelope around the exe What? – data structure of software altered during glass mastering process and a envelope around the exe Workaround – no known use as of yet Workaround – no known use as of yet Rating (1(Best)-5(Worst)) - ? Rating (1(Best)-5(Worst)) - ?

12 CD-Cops Who? - Link Data Security and Spinner Software Who? - Link Data Security and Spinner Software What? -a envelope around the exe using the angle between the first and last logical block and a “fingerprint” key What? -a envelope around the exe using the angle between the first and last logical block and a “fingerprint” key Workaround – downloadable program to crack is available Workaround – downloadable program to crack is available Rating (1(Best)-5(Worst)) - 3 Rating (1(Best)-5(Worst)) - 3

13 CD-Protect Who? - Software & Protection Beisheim e.K. Who? - Software & Protection Beisheim e.K. What? – uses direct hardware coding that windows reports as unreadable sectors What? – uses direct hardware coding that windows reports as unreadable sectors Workaround – no known use as of yet Workaround – no known use as of yet Rating (1(Best)-5(Worst)) - ? Rating (1(Best)-5(Worst)) - ?

14 CopyLok Who? - Pan Technology Limited and Toolex International N.V. Who? - Pan Technology Limited and Toolex International N.V. What? – use of a exe wrapper and a watermark that can not be copied without special hardware What? – use of a exe wrapper and a watermark that can not be copied without special hardware Workaround – downloadable program that unwraps the exe Workaround – downloadable program that unwraps the exe Rating (1(Best)-5(Worst)) - 2 Rating (1(Best)-5(Worst)) - 2

15 CrypKey Who? - CrypKey Who? - CrypKey What? – uses sophisticated algorithm to detect if this program can run on this specific machine that must be authorized by the software maker What? – uses sophisticated algorithm to detect if this program can run on this specific machine that must be authorized by the software maker Workaround – none as of yet! Workaround – none as of yet! Rating (1(Best)-5(Worst)) - 1 Rating (1(Best)-5(Worst)) - 1

16 DBB Who? - Effnet Who? - Effnet What? - secret What? - secret Workaround – none as of yet Workaround – none as of yet Rating (1(Best)-5(Worst)) - ? Rating (1(Best)-5(Worst)) - ?

17 DiscGuard Who? - TTR Technologies Inc. Who? - TTR Technologies Inc. What? – encrypted exe with a embedded (inscribed onto the CD) key in the CD What? – encrypted exe with a embedded (inscribed onto the CD) key in the CD Workaround – no general patch but program specific ones are available Workaround – no general patch but program specific ones are available Rating (1(Best)-5(Worst)) - 2 Rating (1(Best)-5(Worst)) - 2

18 FADE Who? - Codemasters Who? - Codemasters What? – degrade game after time and illegal copy is detected What? – degrade game after time and illegal copy is detected Workaround – individual game cracks Workaround – individual game cracks Rating (1(Best)-5(Worst)) – ?2? Rating (1(Best)-5(Worst)) – ?2?

19 LaserLock Who? - MLS LaserLock International Who? - MLS LaserLock International What? – laser marking on the CD surface What? – laser marking on the CD surface Workaround – can copy with CD-Reader that supports RAW and BlindRead or DDump Workaround – can copy with CD-Reader that supports RAW and BlindRead or DDump a downloadable patch hex editor to copy the files with errors Rating (1(Best)-5(Worst)) - 5 Rating (1(Best)-5(Worst)) - 5

20 LockBlocks Who? - Dinamic Multimedia Who? - Dinamic Multimedia What? – readers lock up when trying to read two specific rings What? – readers lock up when trying to read two specific rings Workaround - specific patches needed Workaround - specific patches needed Rating (1(Best)-5(Worst)) - 2 Rating (1(Best)-5(Worst)) - 2

21 Phenoprotect Who? - Codecult Who? - Codecult What? – bad data in the CD is checked if it is there during installation What? – bad data in the CD is checked if it is there during installation Workaround – unknown as of yet Workaround – unknown as of yet Rating (1(Best)-5(Worst)) – 3(many owners of the original disks report problems) Rating (1(Best)-5(Worst)) – 3(many owners of the original disks report problems)

22 ProtectCD Who? - VOB Who? - VOB What? – envelope? What? – envelope? Workaround – CD reader with RAW and a writer with sub-channel writing and the program CloneCD or BlindRead Workaround – CD reader with RAW and a writer with sub-channel writing and the program CloneCD or BlindRead Rating (1(Best)-5(Worst)) - 4 Rating (1(Best)-5(Worst)) - 4

23 Ring PROTECH Ring PROTECH Who? - ED-CONTRTIVE Who? - ED-CONTRTIVE What? – ring on the CD that can not be copied What? – ring on the CD that can not be copied Workaround – none as of yet! Workaround – none as of yet! Rating (1(Best)-5(Worst)) - 1 Rating (1(Best)-5(Worst)) - 1

24 Roxxe Who? - Electronic Publishing Association LLC Who? - Electronic Publishing Association LLC What? – imbedded key and set of protection schemes What? – imbedded key and set of protection schemes Workaround – none as of yet! Workaround – none as of yet! Rating (1(Best)-5(Worst)) - 1 Rating (1(Best)-5(Worst)) - 1

25 SafeDisc Who? - Macrovision Corporation Who? - Macrovision Corporation What? – digital signature and a wrapper What? – digital signature and a wrapper Workaround – 1to1 copy with a reader with RAW, 1to1 copy with a patch, download a unwrapper Workaround – 1to1 copy with a reader with RAW, 1to1 copy with a patch, download a unwrapper Rating (1(Best)-5(Worst)) – 5(and this is very popular to use?) Rating (1(Best)-5(Worst)) – 5(and this is very popular to use?)

26 SafeDisc v2 SafeDisc v2 Who? - Macrovision Corporation Who? - Macrovision Corporation What? – see SafeDisc but a little better What? – see SafeDisc but a little betterSafeDisc Workaround - 1to1 copy with a reader with RAW and sub-channel support, 1to1 copy then unprotect with DAEMON Tools, download a unwrapper Workaround - 1to1 copy with a reader with RAW and sub-channel support, 1to1 copy then unprotect with DAEMON Tools, download a unwrapper Rating (1(Best)-5(Worst)) – 4(this is on nearly every game after 1/1/2001!) Rating (1(Best)-5(Worst)) – 4(this is on nearly every game after 1/1/2001!)

27 SafeCast Who? - Ç-Dilla and Macrovision Corporation Who? - Ç-Dilla and Macrovision Corporation What? – encrypt the gold CD and make the customers get the key from the company What? – encrypt the gold CD and make the customers get the key from the company Workaround – none as of yet (no real need) Workaround – none as of yet (no real need) Rating (1(Best)-5(Worst)) - 4 Rating (1(Best)-5(Worst)) - 4

28 SecuROM Who? - Sony Who? - Sony What? – electronic fingerprint on the glass master What? – electronic fingerprint on the glass master Workaround –copy with CloneCD and a reader that supports RAW and sub-channel data, various patches dependent on the version of SecuROM Workaround –copy with CloneCD and a reader that supports RAW and sub-channel data, various patches dependent on the version of SecuROM Rating (1(Best)-5(Worst)) - 3 Rating (1(Best)-5(Worst)) - 3

29 SoftLock Who? - Assel Who? - Assel What? – encrypted with a unique serial marking on the CD during mastering and a special arrangement of files in TOC What? – encrypted with a unique serial marking on the CD during mastering and a special arrangement of files in TOC Workaround – no known use as of yet Workaround – no known use as of yet Rating (1(Best)-5(Worst)) - ?(sounds good) Rating (1(Best)-5(Worst)) - ?(sounds good)

30 Star Force Star Force Who? - Protection Technology Co. Who? - Protection Technology Co. What? – key and CD-R detection What? – key and CD-R detection Workaround – none as of now Workaround – none as of now Rating (1(Best)-5(Worst)) – 2(not enough games use this to give it a one yet) Rating (1(Best)-5(Worst)) – 2(not enough games use this to give it a one yet)

31 TAGES Who? - Thomson & MPO Who? - Thomson & MPO What? – encryption of the exe What? – encryption of the exe Workaround – replacing exe with a fixed exe Workaround – replacing exe with a fixed exe Rating (1(Best)-5(Worst)) – 3(only one known game uses this) Rating (1(Best)-5(Worst)) – 3(only one known game uses this)

32 The Copy-Protected CD The Copy-Protected CD Who? - Hide & Seek Technologies Who? - Hide & Seek Technologies What? – stops copying on a CDR recorder What? – stops copying on a CDR recorder Workaround – none as of yet Workaround – none as of yet Rating (1(Best)-5(Worst)) – 2(not much info) Rating (1(Best)-5(Worst)) – 2(not much info)

33 The Bongle The Bongle Who? - Hide & Seek Technologies Who? - Hide & Seek Technologies What? – a CD like object that can not be recorded that is used like a Dongle What? – a CD like object that can not be recorded that is used like a DongleDongle Workaround – none as of yet Workaround – none as of yet Rating (1(Best)-5(Worst)) – 1(I like this idea) Rating (1(Best)-5(Worst)) – 1(I like this idea)

34 Bibliography CD Media World http://www.cdmediaworld.com/ CD Media World http://www.cdmediaworld.com/ Digital Intellect http://www.intellect.vsu.ru/index_e.htm Digital Intellect http://www.intellect.vsu.ru/index_e.htm


Download ppt "Software and CD Protection V2 New, Better, Cracked in nearly the same way as before By: Chris Long."

Similar presentations


Ads by Google