Hackers teach you how to crack software

Source: Internet
Author: User

Software cracking-how the registration code in the program exists:

During the cracking process, we will go to the place where the entered registration code is compared with the correct registration code, and then find the correct registration code through tracking and analysis of the program. But the correct registration code usually exists in two forms in the program: explicit and implicit. For the explicit registration code, we can see it directly in the memory of the program, for example, you can directly see a registration code similar to "2Array7500523" in the SOFTICE data window, which is freely written here). It is easier to crack software with explicit registration codes; however, some software programs do not directly compare the entered registration code with the correct registration code, such as converting the registration code into an integer or splitting the registration code, then, we will separate each registration code and compare them one by one in different places, or convert the entered registration code, and then use a special program for verification.

In short, applications adopt different complex calculation methods to avoid direct registration code comparison. For such programs, we usually need to carefully track, analyze each program function, and find the encryption algorithm, then we can crack it. Of course, this requires a certain level of 8086 assembly programming skills and a lot of patience and energy.

Software cracking-Methods for cracking software:

I divided the methods of cracking into two categories, namely, full cracking and brute force cracking. The so-called complete cracking is mainly for software that requires entering the registration code or password. If we can find the correct registration code through tracking the program, the software is successfully registered through the software registration function, which is called a complete cracking. However, if some software itself does not provide the registration function, it only provides a trial DEMO ), or the registration cannot be performed through the software itself, for example, to obtain another dedicated registration program, or to register through the INTERNET), or the encryption technology of the software itself is complicated, the software Cracker has limited capabilities, energy, and time, and cannot directly obtain the correct registration code. At this time, we need to modify the program code of the software itself, that is, Manually changing the operation direction of the software, this type of cracking is called brute-force cracking.

About the address of the program code in the cracking Tutorial: some program code will be added in the cracking tutorial to help explain the analysis method of the program. For example, the following program code:

 
 
  1. 0167:00408033 PUSH 00  
  2.  
  3. 0167:00408035 PUSH EBX  
  4.  
  5. 0167:00408036 CALL [USER32!EndDialog]  
  6.  
  7. 0167:0040803C JMP 0040812C  
  8.  
  9. ...... 

Here, the Code address in the program is 0167: 00408033, and the code segment value is 0167.) There may be differences between different computers, not necessarily the same, but the offset value should be fixed, that is, 00408033 unchanged), so if you see the address value of the program code in the Cracked article is different from the address value in your computer, do not think it is wrong, as long as your program code is correct, there will be no problem.

Software cracking-how to set breakpoints:

Setting breakpoints correctly and appropriately is very important for fast and effective decryption. A good breakpoint setting allows us to quickly find key program segments, improper breakpoint may cause unnecessary energy consumption on decryption, and even cannot intercept the running of the program. However, it is hard to say when to use any breakpoint, which requires accumulation of experience. In general, bpx hmemcpy, a universal breakpoint, is useful for most software with registration code, for beginners, try this breakpoint.

For software that requires brute-force password cracking, we should usually intercept the dialog box such as bpx DialogBox) and message box such as bpx MessageBox (. No matter which type of software, when the breakpoint we set has no effect, but try bpx lockmytask, this breakpoint is used to intercept any button action, for more information about common breakpoint settings, see section "cracking common breakpoint Settings.

In addition, you usually need to enter the user name and registration code to crack the registration code. Generally, the user name and password can be entered at will, but according to my own experience, many software processes the registration code one by one. If you enter the number "78787878, so we can't know which "78" we saw at the time when tracking the program, so I prefer to use a registration code like "12345678, in this way, you can know which digit of the registration code the program is performing operations on. Similarly, for software that requires a long serial number, enter a serial number similar to "12345-678Array0-ABCDEF.

However, you need to pay special attention to the following: the registration code input method "12345678" mentioned above is intended to intercept WIN32 API functions. if sometimes it is difficult to find a breakthrough in programs to intercept WIN32 API functions directly, when we use the "S" command to search for the user name or registration code we entered in the memory, we 'd better not use "12345678" as the registration code, because there may be many "12345678" strings in the memory, we have no way to know which program we are going to crack is "12345678 ", therefore, we should select a registration code that is not easy to use with the same memory data, for example, 74747474. The corresponding SEARCH Command is: S 30: 0 L ffffffff'100 '. Of course, the above is just my personal habits. The specific input form can be determined based on my hobbies and habits, without sticking to a fixed pattern.

For more information, see:

Hackers teach you how to crack software

Hackers teach you how to crack software

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.