各位大大,本人係一間公司的engineer, 近日想模擬一隻聖天諾的狗啦,
因這個程式是某監獄的一個監獄系統,每次有問題我都要山長水遠去到他們地方。
所以我想模擬他們的小狗,在公司安裝系統來fixed一些問題啦
隻狗係
SafeNet Sentinal SuperPro
我已有dmp文件reg文件等
亦用了很多軟件,toro superpro emulator 1.7;sentmon
還有許多論壇中的程式,dmp2ssp;dmp2reg;supor dumper等等
得到許多文件,但無論如何,他都不能成功模擬,只是警告我知沒有插入小狗。
各位大大,幫一幫忙
就算沒有什麼方法,都請告訴我---現在是否可以模擬狗的。
TORO Sentinel Info File
DongleType=4
MemorySize=40
DesignID=0000
PartNumber=00000000
SerialNumber=00000000
0000,3 59AE,1 ------ ------ ------ ------ ------ ------
0000,3 ------ ------ ------ ------ ------ ------ ------
------ ------ ------ ------ ------ ------ ------ ------
------ ------ ------ ------ ------ ------ ------ ------
------ ------ ------ ------ ------ ------ ------ ------
------ ------ ------ ------ ------ ------ ------ ------
0000,0 ------ ------ ------ 0000,0 ------ ------ ------
0000,0 ------ ------ ------ 0000,0 ------ ------ ------
PairsCount=4
00,7135A200,7135A200,357100A2
08,4E033775,39658D69,6539698D
08,A4CB8C1B,8AC40AB3,C48AB30A
08,D8ADAFD9,A26D40B9,6DA2B940
程式訪問完後
TORO Sentinel Info File
DongleType=4
MemorySize=40
DesignID=0000
PartNumber=00000000
SerialNumber=00000000
0044,0 59AE,1 ------ ------ ------ ------ ------ ------
0000,3 ------ ------ ------ ------ ------ ------ ------
------ ------ ------ ------ ------ ------ ------ ------
------ ------ ------ ------ ------ ------ ------ ------
------ ------ ------ ------ ------ ------ ------ ------
------ ------ ------ ------ ------ ------ ------ ------
0000,0 ------ ------ ------ 0000,0 ------ ------ ------
0000,0 ------ ------ ------ 0000,0 ------ ------ ------
PairsCount=4
00,7135A200,7135A200,357100A2
08,4E033775,39658D69,6539698D
08,A4CB8C1B,8AC40AB3,C48AB30A
08,D8ADAFD9,A26D40B9,6DA2B940
log如下
In:> Initialize
Out:> Initialize
In:> FindFirstUnit DeveloperId=22958 (0x59AE)
Out:> FindFirstUnit DeveloperId=22958 (0x59AE) -> Status=0x3
In:> FindFirstUnit DeveloperId=22958 (0x59AE)
Out:> FindFirstUnit DeveloperId=0 (0x0) -> Status=0x0
In:> Read Address=48 (0x30)
Out:> Read Address=48 (0x30) -> Status=0x0
Data=0 (0x0)
In:> Read Address=52 (0x34)
Out:> Read Address=52 (0x34) -> Status=0x0
Data=0 (0x0)
In:> Read Address=56 (0x38)
Out:> Read Address=56 (0x38) -> Status=0x0
Data=0 (0x0)
In:> Read Address=60 (0x3C)
Out:> Read Address=60 (0x3C) -> Status=0x0
Data=0 (0x0)
In:> Read Address=0 (0x0)
Out:> Read Address=0 (0x0) -> Status=0x0
Data=68 (0x44)
In:> Query Address=0 (0x0)
Data=7135A200
Out:> Query Address=0 (0x0) -> Status=0x0
Response=7135A200
Response32=357100A2
In:> Query Address=8 (0x8)
Data=4E033775
Out:> Query Address=8 (0x8) -> Status=0x0
Response=39658D69
Response32=6539698D
In:> Query Address=8 (0x8)
Data=D8ADAFD9
Out:> Query Address=8 (0x8) -> Status=0x0
Response=A26D40B9
Response32=6DA2B940
In:> Query Address=8 (0x8)
Data=A4CB8C1B
Out:> Query Address=8 (0x8) -> Status=0x0
Response=8AC40AB3
Response32=C48AB30A
In:> Read Address=0 (0x0)
Out:> Read Address=0 (0x0) -> Status=0x0
Data=68 (0x44)
In:> Read Address=0 (0x0)
Out:> Read Address=0 (0x0) -> Status=0x0
Data=68 (0x44)
麻煩你們啦:
[招生]系统0day安全班,企业级设备固件漏洞挖掘,Linux平台漏洞挖掘!