1st. Thnx for the TEAM:



1- Dr.Kiev and FEW Forum Members for the info.

2- Reverse Engineering Brothers - they are the BEST on Developing this Solution.

3- The Unknown Guy who made this Idea comes to Birth. Dizman

4- Einstein9 - R n D Team Leader for this Project.



Facts About Smartware:



USB 2.0 uses Initio 1607E

USB 3.5 uses Symwave Chip



3.5" Smartware comes with 5 Different Types:



A) Initio 1606L

B) Initio 1607E - Type 1

C) Initio 1607E - Type 2

D) Private

E) Private





Applications Used:



1- SoftIce

2- OllyDBG

3- WinHex

4- W32Dasm

5- IDA







Things must know about Smartware:



1- U12, U14 has no relation

2- Encryption on the fly

3- USB 2/3 share the same technique (some how)

4- All Actions are in Last Head saved, so it must is capable of R/W

5- Playing with HM result in Brute Force Attack = Drive Exceeded Password Retry format is a Must. (for now only, working on it)





Problems and Solution:



The whole Idea starts from the UNLOCK.EXE file which is located inside the VCD partition

the EXE file calls few functions inside and for the Reverse Engineering team they had

problems tracing 3 of them which were hidden functions

it took them 2 months testing and researching those 3 only.



But Finally, they DID it



the Smartware Bypass Stays in Specific Memory Address and when we execute the Unlock.exe file

it reads from specific sector @ the end, and verifies the contents and brings

back the Password window, where here we are forcing it to read OUR default Password

and it confirms it as YES IT IS CORRECT.



then the partition will be mounted and we can access the DATA



the Bypass Utility will not Write Anything, kind of Cheating Machine same as Game Cheating.



very simple in explaining, but took a lot hell of time to translate this to Action.



I DON`T NEED TO KNOW THE PASSWORD, to access the DATA, just bypass it with my default Set password





Quote: " Everything should be made AS SIMPLE AS POSSIBLE, but NOT ANY SIMPLER." Albert Einstein





The Video Demo:



USB 2.0 uses Initio 1607EUSB 3.5 uses Symwave ChipA) Initio 1606LB) Initio 1607E - Type 1C) Initio 1607E - Type 2D) PrivateE) Private1- SoftIce2- OllyDBG3- WinHex4- W32Dasm5- IDA1- U12, U14 has no relation2- Encryption on the fly3- USB 2/3 share the same technique (some how)4- All Actions are in Last Head saved, so it must is capable of R/W5- Playing with HM result in Brute Force Attack = Drive Exceeded Password Retry format is a Must. (for now only, working on it)The whole Idea starts from the UNLOCK.EXE file which is located inside the VCD partitionthe EXE file calls few functions inside and for the Reverse Engineering team they hadproblems tracing 3 of them which were hidden functionsit took them 2 months testing and researching those 3 only.But Finally, they DID itthe Smartware Bypass Stays in Specific Memory Address and when we execute thefileit reads from specific sector @ the end, and verifies the contents and bringsback the Password window, where here we are forcing it to read OUR default Passwordand it confirms it as YES IT IS CORRECT.then the partition will be mounted and we can access the DATAthe Bypass Utility will not Write Anything, kind of Cheating Machine same as Game Cheating.very simple in explaining, but took a lot hell of time to translate this to Action.I DON`T NEED TO KNOW THE PASSWORD, to access the DATA, just bypass it with my default Set passwordThe Video Demo: https://www.youtube.com/watch?v=gXe7Tyc1JvE

_________________

Kuwait Data Recovery - UNIX GTC

The only reason for time is so that everything doesn't happen at once. By: Albert Einstein



