It has been pretty long time since I posted last note… And this time don’t have good news.
Some time ago I confirmed the Windows 7 SDCs are encrypted with Blowfish. Not entire archive – just the headers, but still – you need two 32-character keys that are hardcoded in the original downloader .exe and different at least for each university. Blowfish is pretty strong encryption, bruteforcing it with keys of this length is mission impossible. Plain text attacks are not a solution for BF too.
Nice job Greg from MS (finally)! I guess that’s your name looking at names of temporary files your soft creates5 comments
5 Comments. Add your own
You reckon there’s any way of easily extracting those keys from where they’re hiding?
In any case, using Windows in a Virtualbox (have been using your extractor on Ubuntu Linux to avoid Windows) to extract my ISOs is about the best for now.
Cheers for the update.
Wait, Rock, you mean you’re extracting Windows 7 ISOs on Ubuntu? Can you share how?
Using Windows XP (coincidently extracted using the unpacker on here installed in a VirtualBox. Just mapping a host folder from my machine (eg /home/rock/Desktop) onto the virtual machine and then using the official MSDNAA process to download/unpack the ISO. When it asks where to extract to, select your mapped folder and there you go — 1 ISO on your Ubuntu install.
Not very magic, but it solves the issue for me. Really, Microsoft’s just annoying more than anything since I can just share my ISOs or burnt discs around with colleagues.
So are you “downloading” the ISO from your machine, to the VM, or are you just unpacking using MS’ program? I thought that you had to download and unpack all using their program.
Could you maybe post a link to the program?
Actually, I forgot that it is now possible to directly download ISOs from MS. So there is no reason we need to go through all this anymore. Haha.