1. Run wkdumpers for cipher text.
2. Place into gk_feal.c in knCipher array.
3. Solve the key (it should say ok passed).
4. Place solved ciphertext into bruteforce solver. (could take up to 4 days).
5. Place brutesolver values into emulator.
6. Any decent coder can take this source and make it really nice and friendly. I hope some of the hasp guys on this forum update it for mass use.
Note: I suggest using test vectors already existing in sources. The .h file has them. Formz dumpdng. has sample vectors for gk_feal.c first for steps 1-5 to make sure you do it correctly. This code is borland, but easily ports. Source is old as dirt but too lazy to give you all the newer cleaner stuff. Have fun.
Code can be optimized plenty, especially the solver (we already did but you can do it for fun).
Newer wibus can be solved to with the extra 0xFF keysize. Thats for you guys to figure out.