Feeds

Keygen routine producing valid WinXP product keys?

Sounds like bad news for Microsoft's WPA...

  • alert
  • submit to reddit

Top three mobile application threats

A cracking system for Windows Product Activation publicised this week may present Microsoft's anti-piracy system with its most serious problem yet. It takes the form of a key generator which appears to produce valid activation keys for Microsoft products, and if this really is the case, it is difficult to see how Microsoft can differentiate between keys issued with legal product, and keys generated by the keymaker.

It sounds too good (well, depending on your outlook) to be true, but while forum operators are in general managing to keep a lid on people posting locations for the program, it seems clear from discussion threads on several of them that it is indeed producing keys that work. The keymaker first gained widespread publicity earlier this week at Heise.de, which tested it and says it generated 25 keys for XP Home overnight. Heise's report, in German, can be found here, while Neowin.net has a translation of the important bits here.

Judging by the time taken to generate keys there's a significant amount of crunching going on, but on the other hand as this is precisely the sort of thing Microsoft must have anticipated when it devised WPA, it's not nearly as much crunching as you'd expect. If one morally questionable teenie can successfully generate one operational key by leaving their home PC running overnight, then Redmond has quite clearly blundered. 25 in a night counts as blundering big-time.

Prior to the keymaker WPA had been cracked, although that rather depended on what you meant by the word; as Microsoft has heroically argued, being pirated wholesale and being cracked are in fact two different things. Philosphically, anyway. Patched versions swiftly became available when the software went gold, but essentially these can be termed unauthorised distributions/variants of the software, and although it means people can get it for free, Microsoft has the capability of zapping their installations as a side-effect of service packs and similar. As yet the company doesn't seem to have used Windows Update to deactivate warez systems, but it's possible.

The other major circumvention of WPA is via leaked keys for corporate versions, which are unlocked simply by entering the key, rather than it being necessary to activate over the Internet or by phone. Again, Microsoft can invalidate these keys at service pack time, and it has done so at least once in the past.

So the question as regards keymaking software is whether or not Microsoft has any way to differentiate between generated keys and the ones it has issued itself. If not, this generation of WPA is now surely toast. ®

3 Big data security analytics techniques

More from The Register

next story
Sorry London, Europe's top tech city is Munich
New 'Atlas of ICT Activity' finds innovation isn't happening at Silicon Roundabout
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.