Hang Seng JRES platform Registration Vulnerability (crack Registration)
The registration mechanism of Hang Seng JRES platform uses plug-ins. Its jar package is easily decompiled to construct correct registration files.
Run the com. hundsun. ares. studio. jres. register_1.1.0.201208291408.jar decompilation, based on com \ hundsun \ ares \ studio \ jres \ register \ RegisterUtil. java files can be encrypted to the registration file and the key.
Decrypt the original ares. key under the eclipse-jres \ keys directory:
<Regunits> <regunit id = "jres" key = "xxxxxxxxxxxxxxxx" date = "20121231"> <field id = "jres. username "label =" username "value =" xxxxxxx "/> <field id =" jres. version "label =" version "value =" 1.1 "/> <field id =" jres. company "label =" company name "value =" Bank 4 "/> <field id =" jres. buildpermission "label =" compile permission "value =" 1 "displayValue =" 1 _ compilable "/> </regunit> </regunits> </code>
The key indicates the machine code, and the date indicates the expiration time. After the key is replaced, it is re-encrypted and registered successfully.
Solution:
Enhanced verification or online Authentication