+ Reply to Thread
Results 1 to 15 of 15

Thread: So, where do those keys come from?

  1. #1
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,439
    Activity Longevity
    8/20 19/20
    Today Posts
    1/5 ssss39439

    Question So, where do those keys come from?

    You probably know what I'm talking about. A lot of people use certain antivirus/security suite programs that require a username and password combo (or key file, in Kaspersky's case, for example) to authenticate themselves and download updates. Those of us that can't or don't want to pay resort to Web sites written in East Asian languages that provide new login data every few days, or small applications that download the necessary information and sometimes even automatically apply it to the antivirus program's settings.

    My question is... where the !"#$ do they keep on getting fresh passwords or license files in a near-daily basis!? Is someone actually paying for those, and then posting them publicly on the Internet? Do Eset or Kaspersky have an insider that adds them to the database to make them valid?
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  2. Who Said Thanks:

    slikrapid (04.04.10)

  3. #2


    Join Date
    22.06.08
    Location
    astral planes
    P2P Client
    sbi finest
    Posts
    3,125
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 sssss3125
    Quote Originally Posted by anon View Post
    Do Eset or Kaspersky have an insider that adds them to the database to make them valid?
    like the question: would these companies intentionally do something like that to increase their share of the market as it may reflect onto their stocks value in a beneficial way

    or would antivirus companies directly or indirectly create new viruses in order to be the first ones to find an anti-virus solution to the new threat, again with multiple benefits

    also, is someone monitoring who applies those specific combos?

    and so on
    Reply With QuoteReply With Quote
    Thanks

  4. #3
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,439
    Activity Longevity
    8/20 19/20
    Today Posts
    1/5 ssss39439
    Quote Originally Posted by slikrapid View Post
    like the question: would these companies intentionally do something like that to increase their share of the market as it may reflect onto their stocks value in a beneficial way
    I've had a few talks about that in real life - arrived to the conclusion companies, one way or the other, appreciate the efforts of crackers and these kind of pages/programs offering serials - if NOD32 was completely uncrackable, for example, its popularity would suffer a great drop.
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  5. #4
    yeah i wondered the same thing in the past,
    i'm using a free anti-virus thats why i don't care for this,

    but i think those keys are database dumps? hmm but i doubt that now, because its really stupid no to patch the auth servers...

    OR

    take for example norton av 2005, it had a keygen that worked online and can give you 1 year subscription, so i can also guess that those keys are generated randomaly or by Reverse engineering so they will match the AV's salt/hash/compare method..


    I am cheatos

    Reply With QuoteReply With Quote
    Thanks

  6. #5
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,439
    Activity Longevity
    8/20 19/20
    Today Posts
    1/5 ssss39439
    Quote Originally Posted by cheatos View Post
    take for example norton av 2005, it had a keygen that worked online and can give you 1 year subscription, so i can also guess that those keys are generated randomaly or by Reverse engineering so they will match the AV's salt/hash/compare method..
    But aren't keys/passwords checked by the login server? One would think the username+password combo needs to be present in the remote database...
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  7. #6
    Quote Originally Posted by anon View Post
    But aren't keys/passwords checked by the login server? One would think the username+password combo needs to be present in the remote database...
    my bad, i forgot how the keygen worked exactly,
    it worked via the telephone activation system, norton gets a key from the server then by usign the keys you was able to activate it and get a 1 year subscription.
    Last edited by cheatos; 04.04.10 at 23:39.


    I am cheatos

    Reply With QuoteReply With Quote
    Thanks

  8. #7
    Member supermarrioh's Avatar
    Join Date
    06.01.08
    Location
    secretsbipornocellar
    P2P Client
    secretsbipornocellar
    Posts
    590
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 ssssss590
    Most of them are crawled by Keystealer-Botnets or are fake-purchased i think.
    There are huge Botnets out there with the only purpose to spread themselves and to send all serials/login data stored on the Infected PC to their host. And most of them are FUD if they are good.
    The Other way to get keys i know is to purchase them with faked payment in Online-Stores.
    "I like waffles."
    "Pardon, you like what?"
    Reply With QuoteReply With Quote
    Thanks

  9. Who Said Thanks:

    Uninvited2611 (06.04.10) , tokiodrift1 (06.04.10) , cheatos (04.04.10) , anon (04.04.10)

  10. #8

    Join Date
    24.12.09
    Location
    USA
    P2P Client
    uTorrent
    Posts
    135
    Activity Longevity
    0/20 17/20
    Today Posts
    0/5 ssssss135
    There could be an exploit on one of the NOD32 servers or the Kaspersky servers that they are able to steal all the keys, Kaspersky especially has been hacked a few times before. There could also be an exploit that provides keys through some payment glitch. Porn sites for example get hacked so many times over and over again and people would have access to the whole user database all they had to do was decrypt it which they were able to with relative ease. Another method is by botnets and stealers. I had a friend who made a multi cd key stealer and he would sell the cd keys, saw a guy with 12,000 lines of COD4 CD Keys once also, but of course you can't be sure that they all work. I don't believe that the botnet method could provide daily fresh keys non-stop unless someone had a really good spreader.
    Last edited by MrCheat; 05.04.10 at 00:41.
    Reply With QuoteReply With Quote
    Thanks

  11. Who Said Thanks:

    anon (05.04.10)

  12. #9

    Join Date
    20.03.10
    P2P Client
    uTorrent
    Posts
    402
    Activity Longevity
    0/20 17/20
    Today Posts
    0/5 ssssss402
    It's is a topic that makes you think a lot.
    I don't think the keys are leaked out or people are getting them by some means. I think as anon and slikrapid said, the codes are released by the company itself to make people use their software. Personally, I changed to Eset from Kaspersky because I was sick with the key thing. So, this method really works
    Reply With QuoteReply With Quote
    Thanks

  13. Who Said Thanks:

    slikrapid (05.04.10)

  14. #10

    Join Date
    07.08.08
    Posts
    205
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 ssssss205
    An exploit on the servers of a company that specializes in security seems unlikely. My guess is what supermarrioh mentioned, they're datamined from trojan botnets.
    Last edited by Nobody; 05.04.10 at 19:02.
    Reply With QuoteReply With Quote
    Thanks

  15. #11

    Join Date
    24.12.09
    Location
    USA
    P2P Client
    uTorrent
    Posts
    135
    Activity Longevity
    0/20 17/20
    Today Posts
    0/5 ssssss135
    Quote Originally Posted by Nobody View Post
    An exploit on the servers of a company that specializes in security seems unlikely. My guess is what supermarrioh mentioned, they're datamined from trojan botnets.
    You would be surprised, if the Chinese can hack google is Eset a match and isn't the primary source of those Eset login info on a Chinese website?
    Reply With QuoteReply With Quote
    Thanks

  16. #12
    kelly's Avatar
    Join Date
    15.04.09
    Location
    No mans lan....doh!
    P2P Client
    utorrent 1.8
    Posts
    281
    Activity Longevity
    0/20 18/20
    Today Posts
    0/5 ssssss281
    I second Slik,Anon's view.

    IMO,these could be perhaps be termed as 'necessary evil ' in order to provide an illusion of safe & secure browsing ,computing or whatever. According to Carl Schmidt on Neo Con theory, in order to keep the society under control, the govt or the authorities should have an ' enemy image ' . If we look from a broader perspective , this theory do fits in well in this case.
    Reply With QuoteReply With Quote
    Thanks

  17. Who Said Thanks:

    slikrapid (05.04.10)

  18. #13


    Join Date
    22.06.08
    Location
    astral planes
    P2P Client
    sbi finest
    Posts
    3,125
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 sssss3125
    Quote Originally Posted by kelly View Post
    in order to keep the society under control, the govt or the authorities should have an ' enemy image ' . If we look from a broader perspective , this theory do fits in well in this case.
    there is also another one which implies that members of the society should be kept busy/occupied, otherwise who knows what they might think of or do with too much spare time, ie:

    'idle hands are the devil's playground'

    for example, they might figure out the 'enemy image' plan
    Reply With QuoteReply With Quote
    Thanks

  19. #14

    Join Date
    20.03.10
    P2P Client
    uTorrent
    Posts
    402
    Activity Longevity
    0/20 17/20
    Today Posts
    0/5 ssssss402
    Quote Originally Posted by MrCheat View Post
    You would be surprised, if the Chinese can hack google is Eset a match and isn't the primary source of those Eset login info on a Chinese website?
    Remember that they are likely to sponsored by the government, when a government sponsors a hacking mission anything can go down
    Reply With QuoteReply With Quote
    Thanks

  20. #15

    Join Date
    01.10.08
    Location
    Drexciya
    P2P Client
    SBI Toxic
    Posts
    266
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 ssssss266
    Well, I think most of you are right.
    Marketshare is the key to be called the leader in any market, so there might be some companies leaking keys to increase market share, just like those win7 builds mysteriously were.
    Also, there might be people hacking, sniffing or simply giving away keys, specially unhappy employees (Working in a code factory overseas is not always the best time of your life)
    So I do not think there is THE answer to this question, just a bunch of little answers that create a bigger picture.
    I personally think is mostly employees, which can usually access user DBs and/or have some very nice tools to make whatever they want to test the app.
    Reply With QuoteReply With Quote
    Thanks

+ Reply to Thread

Tags for this Thread

Posting Permissions

  • You may post new threads
  • You may post replies
  • You may not post attachments
  • You may not edit your posts
  •