diff options
Diffstat (limited to 'blog')
| -rw-r--r-- | blog/2024-09-06-Keyhole/index.md | 2 | ||||
| -rw-r--r-- | blog/2025-02-14-TSforge/index.md | 2 | ||||
| -rw-r--r-- | blog/2025-07-08-TheIncident/index.md | 2 | ||||
| -rw-r--r-- | blog/2025-12-16-Briefing/index.md | 2 |
4 files changed, 4 insertions, 4 deletions
diff --git a/blog/2024-09-06-Keyhole/index.md b/blog/2024-09-06-Keyhole/index.md index 234dc4f..ecfeb0c 100644 --- a/blog/2024-09-06-Keyhole/index.md +++ b/blog/2024-09-06-Keyhole/index.md @@ -19,7 +19,7 @@ In our ongoing work to bypass Windows licensing checks, we occasionally stumble One such discovery, which we've named "Keyhole", turned out to be a highly effective DRM bypass. It gave users the ability to license any Microsoft Store app or any modern Windows edition with ease. -<!-- truncate --> +{/* truncate */} Following the disclosure of [CVE-2024-38184](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38184) by [Cisco TALOS](https://talosintelligence.com), we have decided to share our findings on Keyhole, which we independently uncovered around the same time it was reported to Microsoft. diff --git a/blog/2025-02-14-TSforge/index.md b/blog/2025-02-14-TSforge/index.md index 03d36c0..1ab0870 100644 --- a/blog/2025-02-14-TSforge/index.md +++ b/blog/2025-02-14-TSforge/index.md @@ -17,7 +17,7 @@ Edited by May 2025 marks nearly 20 years since the introduction of Windows' current DRM system, the Software Protection Platform (SPP). With it serving as the primary gateway to activation since [early in Windows Vista's development](https://betawiki.net/wiki/Windows_Vista_build_5212_(winmain)), many have come up with clever ways of tricking it, from [resetting grace period timers](https://www.mydigitallife.net/activate-64-bit-windows-vista-ultimate-and-x64-with-timerstop-v2a-crack-plus-2099-trick/) to [emulating KMS servers](https://forums.mydigitallife.net/threads/kmsemulator-kms-client-and-server-emulation-source.41010/) to [hooking bootloaders](https://forums.mydigitallife.net/threads/windows-loader-download.58464/). While all of these systems abuse various activation methods, there has never been an exploit that directly attacked SPP itself... until now. -<!-- truncate --> +{/* truncate */} In this blogpost, we introduce [TSforge](https://github.com/massgravel/TSforge), one of our most powerful activation exploits ever. Capable of activating every edition of every version of Windows since Windows 7, as well as every Windows addon and Office version since Office 2013, TSforge is both the most complex and most wide-reaching exploit we've implemented in MAS to date, rivaled only by our ill-fated [Keyhole](https://massgrave.dev/blog/keyhole) exploit. Aside from discussing how TSforge works, I'll also be discussing the wild path we took to discover and understand it, as well as some of the fun things we did with it along the way. diff --git a/blog/2025-07-08-TheIncident/index.md b/blog/2025-07-08-TheIncident/index.md index 0909106..0d99c51 100644 --- a/blog/2025-07-08-TheIncident/index.md +++ b/blog/2025-07-08-TheIncident/index.md @@ -12,7 +12,7 @@ image: /img/blog_card.png A recent Windows update killed our new activation exploit, [TSforge](https://massgrave.dev/tsforge)... or so we thought. I will break down what went wrong, how we worked around the problem, and in the process, make a point about the apparent decline in Microsoft's code quality control. -<!-- truncate --> +{/* truncate */} When we released [TSforge](https://massgrave.dev/tsforge) back in February, it served as an entrypoint for [multiple activation methods](https://massgrave.dev/tsforge#zerocid--kms4k--avma4k). Many [news](https://www.techspot.com/news/106819-hacker-group-releases-updated-tool-activate-almost-all.html) [websites](https://www.androidauthority.com/mas-activate-windows-office-v3-tsforge-3527610/) wrote articles about it on release, giving it a ton of publicity. diff --git a/blog/2025-12-16-Briefing/index.md b/blog/2025-12-16-Briefing/index.md index a267f30..57e0750 100644 --- a/blog/2025-12-16-Briefing/index.md +++ b/blog/2025-12-16-Briefing/index.md @@ -11,7 +11,7 @@ image: /img/blog_card.png We are constantly looking for ways to improve the reliability, usability, and efficiency of the script, as per our goal of creating the best Windows activator out there. As such, we'd like to announce some changes that we want to make sometime in the future. -<!-- truncate --> +{/* truncate */} ## Future Plans |
