Feeds

Keygen routine producing valid WinXP product keys?

Sounds like bad news for Microsoft's WPA...

  • alert
  • submit to reddit

Combat fraud and increase customer satisfaction

A cracking system for Windows Product Activation publicised this week may present Microsoft's anti-piracy system with its most serious problem yet. It takes the form of a key generator which appears to produce valid activation keys for Microsoft products, and if this really is the case, it is difficult to see how Microsoft can differentiate between keys issued with legal product, and keys generated by the keymaker.

It sounds too good (well, depending on your outlook) to be true, but while forum operators are in general managing to keep a lid on people posting locations for the program, it seems clear from discussion threads on several of them that it is indeed producing keys that work. The keymaker first gained widespread publicity earlier this week at Heise.de, which tested it and says it generated 25 keys for XP Home overnight. Heise's report, in German, can be found here, while Neowin.net has a translation of the important bits here.

Judging by the time taken to generate keys there's a significant amount of crunching going on, but on the other hand as this is precisely the sort of thing Microsoft must have anticipated when it devised WPA, it's not nearly as much crunching as you'd expect. If one morally questionable teenie can successfully generate one operational key by leaving their home PC running overnight, then Redmond has quite clearly blundered. 25 in a night counts as blundering big-time.

Prior to the keymaker WPA had been cracked, although that rather depended on what you meant by the word; as Microsoft has heroically argued, being pirated wholesale and being cracked are in fact two different things. Philosphically, anyway. Patched versions swiftly became available when the software went gold, but essentially these can be termed unauthorised distributions/variants of the software, and although it means people can get it for free, Microsoft has the capability of zapping their installations as a side-effect of service packs and similar. As yet the company doesn't seem to have used Windows Update to deactivate warez systems, but it's possible.

The other major circumvention of WPA is via leaked keys for corporate versions, which are unlocked simply by entering the key, rather than it being necessary to activate over the Internet or by phone. Again, Microsoft can invalidate these keys at service pack time, and it has done so at least once in the past.

So the question as regards keymaking software is whether or not Microsoft has any way to differentiate between generated keys and the ones it has issued itself. If not, this generation of WPA is now surely toast. ®

Combat fraud and increase customer satisfaction

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.