Companies and hacking teams providing GSM phone unlocking services are building GPU clusters to attack Nokia phones protected with the latest Sim Lock 3, or SL3, mechanism. The picture below shows what is at least a 52-GPU cluster —I count 2 graphics cards per machine— or perhaps 104 GPUs if these are dual-GPU cards. Update 2011-01-06: Indeed, the position and number of graphics ports in the back match the dual-GPU AMD Radeon HD 5970 card. It in the GSM-Forum community. This community is all abuzz these days because until now SL3 unlocking services could only be purchased from entities running these clusters, but on December 23, 2010, effectively enabling individuals with high-end GPUs to unlock small numbers of phones in a matter of hours or days.
Nokia SL3 BruteForce Calculation it 's service offer calculation of unlock code calculation for Nokia SL3 phones using bruteforce method (basing on log or data sedned by client). LGE Universal Service Tool Credits for SeTool more. I am just curious to know how SL3 Unlock Code calculation works. As in some boxes there is. The keyspace is so large because Nokia have decided to use a random number. All tool gets PM120 also with imei.
(The computing-intensive step in SL3 unlocking consists of finding a 15-digit code such as the SHA-1 hash of this code concatenated with a random number and the IMEI of the phone is equal to a known hash: SHA-1($code.$rnd.$imei) = $hash. This embarrasingly parallel task is perfectly suited to GPUs.) But there is a twist: the MX-KEY team illegally tool, modified the executable in an attempt to obfuscate it, and inconspicuously integrated it in their SL3 unlocking suite! Bizarrely they decided to go the trouble of modifying a binary when they seem to have at least basic software skills that would allow them to write a simple SHA-1 brute forcing loop in OpenCL. Even more bizarrely, when recommending hardware specs for running their tool, the MX-KEY team also copied/pasted word for word the hardware detail list that I documented when building a 4 x AMD Radeon HD 5970 machine (compare and ):. $80 - Chassis Norco RPC-170 1U. $140 - PSU Supermicro PWS-562-1H (aka Compuware CPS-5611-3A1LF) 560 Watt 80 PLUS Silver. $65 - Mobo Gigabyte GA-P31.
etc That, I do not mind. I feel more sorry for Ivan's hard work whose software license is being violated. The GSM unlocking community is both fascinating to me because of the sheer amount of hardware resources being thrown at it, but also seems rampant with piracy. Sirosoft wrote: evry solutions for sl3 is the most populer isue in the gsmcomunity.
Mxkey have solutions to brake of expensiv cost for unlocking sl3 nokia phone.and u see they alwys first. About ighashgpu.it created by ivan golubevsome talented boy from rusia. But his soft is just an optimized bruteforcer, and SL3 version it's just the same bruteforcer + salt generator (rnd+imei) integrated inside, like mx-key and cycolne softs, so it can't unlock SL3 phones, it can just bruteforce SHA1 hash!! To do all the unlock work he must integrate custom loaders for each supported hash + FBUS interface to be able to read/decrypt NCK hashs before bruteforce them. Alex wrote: The major problem is ighashgpu is too buggy to be used properly and still with limitation inside. About 10% of the times the bruteforce gives no result after 4-10 days of computer running with wasting of time and money and you must start the bruteforce again hoping this time the code will be found.
The limits are in the operative system and the big range of use it is done for: a) Under linux, as with whitepixel, would be enaugh half of the computers actually used in any cluster but ighashgpu is only working with windows b) An optimized software to bruteforce only SHA1 and using only a 10 char set (01, 02, 03, 04, 05, 06, 07, 08, 09, 00) would be at least 20-30% faster. People now is investing money in computer for the bruteforce but a better and optimized software would be a great help for this job. Lets hope someone decides to work on it. Kindly regards Alex 21 Jan 2011 01:06 UTC.