1st. Thnx for the TEAM:1- Dr.Kiev and FEW Forum Members for the info.
2- Reverse Engineering Brothers - they are the BEST on Developing this Solution.
3- The Unknown Guy who made this Idea comes to Birth. Dizman
4- Einstein9 - R n D Team Leader for this Project.Facts About Smartware:USB 2.0 uses Initio 1607E
USB 3.5 uses Symwave Chip
3.5" Smartware comes with 5 Different Types:A) Initio 1606L
B) Initio 1607E - Type 1
C) Initio 1607E - Type 2
D) Private
E) Private
Applications Used:1- SoftIce
2- OllyDBG
3- WinHex
4- W32Dasm
5- IDA
Things must know about Smartware:1- U12, U14 has no relation
2- Encryption on the fly
3- USB 2/3 share the same technique (some how)
4- All Actions are in Last Head saved, so it must is capable of R/W
5- Playing with HM result in Brute Force Attack = Drive Exceeded Password Retry format is a Must. (for now only, working on it)
Problems and Solution:The whole Idea starts from the UNLOCK.EXE file which is located inside the VCD partition
the EXE file calls few functions inside and for the Reverse Engineering team they had
problems tracing 3 of them which were hidden functions
it took them 2 months testing and researching those 3 only.
But Finally, they DID it
the Smartware Bypass Stays in Specific Memory Address and when we execute the
Unlock.exe file
it reads from specific sector @ the end, and verifies the contents and brings
back the Password window, where here we are forcing it to read OUR default Password
and it confirms it as YES IT IS CORRECT.
then the partition will be mounted and we can access the DATA
the Bypass Utility will not Write Anything, kind of Cheating Machine same as Game Cheating.
very simple in explaining, but took a lot hell of time to translate this to Action.
I DON`T NEED TO KNOW THE PASSWORD, to access the DATA, just bypass it with my default Set password
Quote:
" Everything should be made AS SIMPLE AS POSSIBLE, but NOT ANY SIMPLER." Albert Einstein
The Video Demo:
https://www.youtube.com/watch?v=gXe7Tyc1JvE
![Idea :idea:](./images/smilies/icon_idea.gif)