Bugtraq mailing list archives

RE: Programmer claims MS eBook Reader Cracked


From: Рягин Михаил Юрьевич <ryagin () extrim ru>
Date: Mon, 3 Sep 2001 11:04:17 +0600

There is also another technique to crack Microsoft eBook Reader, not related to any cryptographic issues.

At least with text of e-book, everything is easy. When reader displays current book page, this 
page is stored in memory as decrypted string of text. In case of Microsoft eBook Reader, this is Unicode string.

The only thing you have to do is to scroll via all pages of the ebook and catch all the text.
Reader's memory is readable by convenient Win32 Debug APIs.

There will be relatively hard to find the text in heap memory, but this can be achieved, for example, by injecting
heap monitor dll (well-known DLL injecting method) and catching all memory allocations of sizes comparable with common
text page sizes.

I had no time to check it. Moreover, this can be not true. This information is only checked on one free-downloadable 
ebook file. On highly-protected book titles page could be protected by more encryption, I guess.

So, I ask someone to check this.

Mikhail Ryagin,
Extrim pro
Russia


Current thread: