GautamGreat, the code that generates the key is easy to find. And the code that generates name is easy to find. But the algorithm that relates the 2. This keygen is more than reverse engineering. There is boolean math. https://pastebin.com/ZZxWe5ME |
==> |
GautamGreat, the code that generates the key is easy to find. And the code that generates name is easy to find. But the algorithm that relates the 2. This keygen is more than reverse engineering. There is boolean math. https://pastebin.com/ZZxWe5ME |
==> |
There is a complex relationship between the name and the key. (1st) the key is in the form XXXXX-XXXXX-XXXXX-XXXXX-XXXXX. The "-"s are discarded and its passed through a 'hashing' algorithm of some sort to produce 16 characters of the hashed key. (2) The name is 'topped up' to 16 characters by looping through the characters from zero. The trailing zero is included in the characters.
(3)The key hash is appended to the topped up name and the first 30 characters are passed through another hashing algorithm. The result of this is a 2 letter code that is compared to the last 2 digits of the hashed key. They should be equal. One can see that the relation ship between the name and the key is complex. I wonder what algo u are using? |
==> |