lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20050727172824.9C03584A@lists.grok.org.uk> Date: Wed Jul 27 18:28:31 2005 From: mail at hackingspirits.com (Debasis Mohanty) Subject: Defeating Microsoft WGA Validation Check >> hi, I came across your site from the article at <http://www.vnunet.com/> www.vnunet.com about this validation workaround. I just have a question, will this workaround work with Microsoft >> Windows Update site? I never tested it for Windows Update. However, as per M$ recent statement windows update will work irrespective of the OS being genuine or not. The test that I conducted was purely done for those Microsoft tools / products available on the M$ download centre which installs only on a genuine copy of Windows. >> No where in the article or on your workaround instructions mentions how this could also work with Windows Update site. Or I could have missed it or something, >> could this check work with W2K as well? FYI: Microsoft has fixed this issue immediately after few days of the workaround was released. So the workaround might not work for any of the current downloads from M$ download centre. Bad Luck ... ;o) There are still ways to circumvent WGA, I am currently working on it but can't comment anything at this point of time. Debasis Mohanty www.hackingspirits.com _____ From: full-disclosure-bounces@...ts.grok.org.uk [mailto:full-disclosure-bounces@...ts.grok.org.uk] On Behalf Of goosee007 Sent: Wednesday, July 27, 2005 11:50 AM To: full-disclosure@...ts.grok.org.uk Subject: [Full-disclosure] Defeating Microsoft WGA Validation Check hi, I came across your site from the article at www.vnunet.com about this validation workaround. I just have a question, will this workaround work with Microsoft Windows Update site? No where in the article or on your workaround instructions mentions how this could also work with Windows Update site. Or I could have missed it or something, could this check work with W2K as well? thanks goose -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050727/4fe00670/attachment.html
Powered by blists - more mailing lists