Once you know what class of device it is, you can determine what USB protocol you need to speak to it.Ībout the legal situation: In the US, it is plain illegal to subvert data protection mechanisms, such as hardware authentication or encryption, unless authorized, and with narrow exceptions for law enforcement and the legal system. My hunch is: it is a type of device that FreeBSD doesn't support, because it comes up solely as a "ugen", meaning generic device. By using various debugging commands like usbconfig and the output from dmesg, you can find out what class of device this is. Typical examples include HID = human interface device for keyboard or mouse, and obviously storage. Every USB device has at least one "class", which tells you what kind of thing it is: a keyboard, a mouse, a printer, a scanner, a storage device, or something else. Here is a starting point: Find out what class of device this is.
#Copy a usb dongle key how to
So the starting point has to be: find out how to "unlock" or authenticate to the device's satisfaction. The issue I see with that is that the term "hardlock" typically applies to authenticated and encrypted devices, which are intentionally designed to not release any information unless you first authenticate. I think what you mean is: you want to copy all the information that is stored in the device out of it.
I actually suspect that it is not a storage device, since most authentication devices don't interact like USB storage (those pretend disk drives), but have only a tiny amount of storage (kilobytes) which are used as part of the security protocols.Īnd when you say "clone", you certainly don't mean that you want to create a physical second copy, which would require re-creating all the hardware.
It could also be a pure authentication device, without storage. It could be a storage device, with built-in authentication and encryption. Can you please explain what that "AKS Hardlock" device really is? And what you mean by "clone"?