A key generator (key-gen) is a computer program that generates a product licensing key, such as a serial number, necessary to activate for use of a software application. Keygens may be legitimately distributed by software manufacturers for licensing software in commercial environments where software has been licensed in bulk for an entire site or enterprise, or they may be developed and distributed illegitimately in circumstances of copyright infringement or software piracy.
Illegitimate key generators are typically programmed and distributed by software crackers in the warez scene. These keygens often play music (taking from the tradition of cracktros), which may include the genres dubstep, chiptunes, sampled loops or anything that the programmer desires. Chiptunes are often preferred due to their small size. Keygens can have artistic user interfaces or kept simple and display only a cracking group or cracker's logo.
A software license is a legal instrument that governs the usage and distribution of computer software.[1] Often, such licenses are enforced by implementing in the software a product activation or digital rights management (DRM) mechanism,[2] seeking to prevent unauthorized use of the software by issuing a code sequence that must be entered into the application when prompted or stored in its configuration.[better source needed]
Many programs attempt to verify or validate licensing keys over the Internet by establishing a session with a licensing application of the software publisher. Advanced keygens bypass this mechanism, and include additional features for key verification, for example by generating the validation data which would otherwise be returned by an activation server. If the software offers phone activation then the keygen could generate the correct activation code to finish activation. Another method that has been used is activation server emulation, which patches the program memory to "see" the keygen as the de facto activation server.
A multi-keygen is a keygen that offers key generation for multiple software applications. Multi-keygens are sometimes released over singular keygens if a series of products requires the same algorithm for generating product keys.
Unauthorized keygens that typically violate software licensing terms are written by programmers who engage in reverse engineering and software cracking, often called crackers, to circumvent copy protection of software or digital rights management for multimedia.
Keygens, available through P2P networks or otherwise, can contain malicious payloads.[3] These key generators may or may not generate a valid key, but the embedded malware loaded invisibly at the same time may, for example, be a version of CryptoLocker (ransomware).[4][5]
Antivirus software may discover malware embedded in keygens; such software often also identifies unauthorized keygens which do not contain a payload as potentially unwanted software, often labelling them with a name such as Win32/Keygen or Win32/Gendows.[3]
A program designed to assist hacking is defined as HackTool.Win32.HackAV or not-a-virus:Keygen from Kaspersky Labs or as HackTool:Win32/Keygen by Microsoft Malware Protection Center. According to the Microsoft Malware Protection Center, its first known detection dates back to July 16, 2009.[6] The following security threats were most often found on PCs that have been related to these tools:
A key changer or keychan is a variation of a keygen. A keychan is a small piece of software that changes the license key or serial number of a particular piece of proprietary software installed on a computer.
You need to know a keys generation algorithm to write a keygen. You need to decompile or disassemble a legal software to find out the algorithm. However reverse engineering violates copyright laws. Thereby keygens are illegal from the start.
Reverse engineering is not inherently illegal or in violation of copyright law. It is a disservice to state otherwise! There are many legal cases upholding the basic right to reverse engineer. Things do get murky.
This is not to say that all reverse engineering is legal. The EFF has an excellent Reverse Engineering FAQ which includes case summaries and legal precedents influencing the legality of reverse engineering. There is also a FAQ about Reverse Engineering at Chilling Effects.
Justin, you can use a keygen to unlock your own legal program in the case you have lost the discs or the serial number for them ;). Not that it would be that often it would happen, but it has actually happened that people has misplaced discs or lost access to their serial, but yet at the same time can provide proof of purchase.
I have seen them plenty of times, with many different types of software, but the one thing I have always wondered, is how software keygens know what key to generate. I know the basic principle of it: the keygen looks somewhere in the software installation files and creates a key that matches some encrypted file which allows the program to work. But I wanted to know how they do that, and how to prevent it. This is really a multiple part question.
Well if you are referring to storing the key the user typed in your system, then sometimes it's saved plaintext in a config file. Sometimes they use symetric (like AES) encryption with a hardcoded key to encrypt this file.
Online activation, but the harder you make it for the customer to use the software the less likely you they will buy it. In the end there isn't a single piece of software that is piracy-proof. If there was, companies like Adobe and Microsoft would be hiring you instantly.
Serial numbers for computer software have a specific pattern, which allows the installer or application to detect whether or not it is a legit key. A very simple example would be that every serial number has exactly three occurances of the number 5 in it - so 1932-1253-2319-5512 would be a working serial number. In a real-life scenario the relationships between the numbers would of course be more complicated.
To create a keygen, a cracker group (people specialized in breaking copy protection schemes) analyze the program executable to find the part that checks the serial. They then reconstruct the algorithm to create the serials based on the checking code. The finished keygen is an app applying the algorithm to create a serial number.
The keygen for Windows xp in the later service packs was more complicated, because Microsoft checked not only whether a key was valid, but also whether it had been sold with a copy and was not already in use on another computer. The keygen sent mass requests to the Microsoft server to check whether or not it was a working key.
Usual practive - never store as plain-text, use irreversible methods of transforming before storing, but - with key activation even plain-text key-storage may be bullet-proof: stolen key, once activated, will not work from second registration (abusable and hackable method, but may work to some degree)
Technically - preventing from running under debugger, combined with encrypted code in file (with in-memory decryption, possible - multi-layer for some sensitive parts), chains of memory manipulations, online verification of keys in external storage (see previous methods, which are applicable separately to checker also)...
Well first of all I'd suggest you to stop seeing those keygen files, as they are hacked piece of softwares (mostly/sometimes) accompanied with some other non-harmful looking image/nfo/lnk files which in full capacity of the hackers/crackers intentions could be crafted especially to infect your machine itself.
You might have heard of img/lnk/other files infecting boxes just when Explorer tries to access it. Then there are keygens being binary themselves which are supposed to execute and perform any stuff on your box, right.
When running some keygens (i.e. applications that generate working license keys for possibly pirated software), low-quality background music is played while the user waits. See this sample YouTube video.
Back in the day (and less often nowadays), pirates "signed" cracked software with their name or emblem or something to that effect. As more and more pirates entered the scene and piracy became more difficult, a cracker's signature became a source of pride and a show of the owner's technical prowess, as well as a show of professional superiority over other crackers. Think, for example, the needlessly flashy company logos at the beginning of movies or games.
When the Amiga raised the general bar on the graphics and sound capabilities of the home PC, cracktros started becoming art pieces in their own right. Your average pirate now had access to music, dynamic color, layering, and composing tools that didn't exist one generation before. In the spirit of competition between pirates, flashy intros and elaborate music that stressed the technical prowess of the machine and the cracker became a must for cracked software, keygens included. Some famous examples of these "demos" pushed to incredible degrees is Megademo and State of the Art.
I've been using computer for 20 years and I've used many antivirus. And I have had many "cracking software" laying around on the various PCs that I have used. These include keygen, software cracks/patchers and game hacks (wallhacks, aimbots, multihacks and etc).
7fc3f7cf58