How would I go about getting brute-forcing an apps product-key? – Digitalmunition




Home Forums How would I go about getting brute-forcing an apps product-key?

This topic contains 1 reply, has 2 voices, and was last updated by  SN-Jared 1 month, 4 weeks ago.

  • Author
    Posts
  • #333566

    anonymous
    Participant

    I want to be able to run a word list against an apps product key prompt. I’ve only brute forced WPA 2 hashes. Is there a way I could get it’s hash file and run John on it? I was think that maybe I could make a Python script that uses a for-loop to go through a wordlist and enter the values on the screen to the textbox, but that’d be too slow

  • #333567

    SN-Jared

    What is a wordlist going to do for you when your issue is a product key? You might as well just randomize A-Z, a-z, 0-9. I would suggest looking into how other product key crackers work and see if there is a viable method for what you’re trying to accomplish.

  • #333568

    ShiroiOk

    An app that requires a serial key either generates it using an algorithm built into the app which would require reverse engineering of the app to see how its done.

    But any app worth its salt will most likely have to be paid, the serial will be generayed server side and sent to the user that would require breaking into the companies server to figure out how they are generated.

    Brute forcing a legit serial key would be time consuming and cost ineffective.

    Your best course of action is to reverse engineer the app and go from there.

You must be logged in to reply to this topic.