Hi, Daniel

 

I'm playing with the new U.are.U 4500 module from DigitalPersona. It
doesn't work which is not a surprise. The image is encrypted.

 

You were able to bypass the encryption for the 4000B model by comparing
its "firmware" with an unencrypted MS reader and found one byte
difference. And now, first of all, the windows driver doesn't send a
"firmware" to the device anymore and second there is nothing to compare
of. In the fix_firmware function, I looped through addresses and did
find the same pattern (FF 17 41) at offset 0x6c7, but after I change it
to FF 07 41, the device refused to power up (set_hwstat to 01,  and
get_hwstat always returns 81). If I don't fix the firmware, I can do
everything else except the image captured is garbage.

 

Could you think of any way that I can do to try to turn off the hardware
encryption? Will a USB sniff log help? What kind of tool do you use to
capture the USB traffic? I can send you a log captured by USBlyzer if
you have this program.

 

Thank you,

Ji Yang

_______________________________________________
fprint mailing list
[email protected]
http://lists.reactivated.net/mailman/listinfo/fprint

Reply via email to