Microsoft CD Key Authentication Revealed!
(You won't see this on their MSDN Level 2 CD!)

You are Visitor Number since Feb. 8th, 1996



If you are interested in other information similar to the Microsoft CD Key, please check out the rest of
Damaged Cybernetics!


Abstract

This document will cover details about what makes up a Microsoft CD Keys and how they are authenticated. With the rush in of Windows'95, Microsoft has implemented a CD Key to either help foil piracy or to track their software thoughout the world. It was brought to my attention by a Microsoft Production Manager that they use this for their regional tracking, and also for product codes. They also understand the weakness of the key.

I find this a little bothersome. Here are some points...

If you can contribute any information about the Microsoft CD Key please inform us!.

Also we do acknowledge there is a small problem concerning with the authentication of the OEM keys. In some of our more extensive tests we discovered that the first 5 digits of the OEM key are actualy being used now.

In either case, the CD Key is really a hassle on my part. I either lose the cases or my kids eat the sticker. (Also those glossy cardboard sleeves are even worse.) Great, how am I supposed to reinstall my software when my system crashes? Also if this IS being used as a scheme to foil piracy. It doesn't work, because one can easily copy the CD-Key as easy as the CD.

C Source code is provided to show how a key can be authenticated.


CD Key Details


Key Authentication

The algorithm to the authentication routine is a VERY simple one. One can write a small amount of source code that will randomly generate valid CD Keys. Lets use the following keys and follow the steps to authenticate them.


© 1995 Damaged Cybernetics





>