Teach you step-by-step encryption and decryption technology-compression and shelling (2) (1)
Source: Internet
Author: User
KeywordsDecryption crack.
The second section is known as a "shell" platform, if the respondents even what is "shell" is not clear, then I was too defeated. Long ago wanted to write complete about the "shell" of the article, but suffer from the time and the level of words, no pen. First of all, I think we should understand the concept of "shell" first. In nature, I think we should not be unfamiliar with the shell of this thing, plants use it to protect the seeds, animals use it to protect the body and so on. Similarly, there is a program in some computer software that is specifically designed to protect software from unauthorized modification or decompile. They typically run before the program, get control, and then complete the task of protecting the software. Just like the shells of animals and plants are usually outside of the body as a matter of course (but later there is the so-called "shell with Seeds" shell). Because this program and the nature of the shell in the function of a lot of the same place, based on the rules of naming, we have such a program called "Shell". Like computer viruses and viruses in nature, they are all named methods. The first to put forward the concept of "shell", as far as I know, should be the launch of the shelling software Rcopy 3 of the author Mr. Xiong. A few years ago in the DOS era, "shell" is generally referred to as the disk encryption Software section encryption program, may be at that time the encryption software has just started, so most of the encryption software (shell software) generated "finished" in the "shell" and the need to encrypt the program between the total has a more obvious "dividing line." Experienced people can track the operation of the software to find this line, as to what this problem, I do not have to say more. But after all, at that time, even now such people are not many, so when RCOPY3 this can easily find the "dividing line", and can easily remove the "shell" software launched immediately after the attention of many people. To be honest, I saw the advertisement in the magazine "Computer", in Guangzhou computer city to see the software marked with 999 yuan, at that time, there is indeed a lot of new ideas, single memory to generate EXE executable file, it should be the world's first. But its thinking in the process of performance I think there are a lot of improvements to be made (although later there are RO97 to enhance their ability), the idea was later and the author of the interview was confirmed. After this, the same type of software to springing up, remember the name of the: Unkey, Mscopy, Unall ... And so on, but a lot of software is decrypting the disk as the main direction, ignore other aspects, of course, this also for later "secret domain Nemesis" "Decryption Machine" and other software laid the foundation, this other branch is not much Xiang talk, I believe that the machine older friends should have seen the advertisement at that time. The progress of decryption (shelling) technology promoted the development of encryption (shell) technology at that time. LOCK95 and Bitlok, such as the so-called "shell with seed" encryption procedures have been released, it isEach out of the Goonies, the small floppy disk also toss hard enough. In the domestic shell software and shelling software competition is fiery red, the foreign "shell" software has been developed to such as lzexe of the compressed shell. This kind of software is actually a standard shell software, it is compressed EXE file, and then in the file with a layer in the software is executed automatically unzip the file "shell" to achieve the purpose of compressed EXE file. Then, this kind of software also more and more, Pkexe, Ainexe, Ucexe and later by many people know wwpack belong to this kind of software, but strange, I did not see a domestic similar software. After a period of time, may be a foreign disk encryption to use the software serial number encryption method, protect EXE files are not dynamic tracking and static decompile is very important. So the shell-adding program that specializes in this function is born. MESS, Crackstop, Hackstop, TRAP, UPS and so on are more famous for this type of software representatives, of course, and still is one of the most, by Taiwan compatriots wrote FSE. In fact, from my point of view, such software can be regarded as authentic Packers software. In the above these shell software constantly upgrade the rivalry, a lot of software to compare the "extreme" technology used up, because at this time DOS can be said to the Masters are playing in the palm of the hand, what protection mode, anti-sice, reverse directives and so on. In contrast, many of the foreign shelling programs that were published during that period can not deal with so many of the Shell army, what UPC, TEU and so on have become the object of protection, the results are more ideal only CUP386, against the domestic, this period of time also did not have this "contradictory struggle." Shell software door Swing all around to the hillock, until in our country encountered TR this fortress, only after the defeat of the various countermeasures, but this is more than a year later things. I often think that if TR can "be born" two years earlier, the achievement must be much bigger than it is now, even it is possible to cover sice. TR published when the popularity of WIN95 has become a fact, DOS how much space, we all know. But then again, TR is really a good software, more than the RCOPY3 of the year, but also proved our China's crack strength (although a bit outdated). This time, the previous mentioned FSE with strong strength also gradually surfaced to the surface, leading the coquettish. It was already at the end of 1997, and I went through the student journey. After work in the Cfido crack district met Ding-boy, soon crack district closed, I became fascinated by the INTERNET, and in June 98 set up a special introduction"Shell" platform: http://topage.126.com, put on my collection of all "Shell" class software. In this time, a variety of "shell" software is also in the upgrade, but there is no much progress, almost is the TR and shell software version of the number of the controversy. In August 1998, a unsec shell software was published, claiming that it could take off all the shells it had published before August 98. After I tested it, I didn't think it was as bad as it was rumored, especially because I didn't want to touch it. Ding-boy to the software author made a lot of suggestions, but sent emial like Niniuruhai, may be rage bar, soon Ding-boy BW (Shockwave) was born. This use of memory to create an EXE file (later abandoned) of the Shell software, in my platform open, has been a lot of friends affirmation. You know, starting from the Rcopy 3, most of the shelling software is to run the target program two times to determine the relocation of EXE data. BW of this feature although there is a problem of compatibility, but also set up their own style, characteristics. After months of improvement, BW upgraded to version 2.0, which is a turning point for bw, because it is already a mature, stable shell software that can deal with most of the shells at the time, including the latest FSE 0.6. More importantly, this version of the choice of shell and software "demarcation line" this most novice headaches to simplify the steps to the point where more friends accept it. In addition, the CI model, which strengthens BW, is something that no other sheller has. Recently, BW published the latest 2.5 BETA2 version, enhanced some aspects of the function, because it can take off the so-called most powerful disk encryption tool Lockking 2.0 of the encryption shell, thus further laying its "shelling" status. When it comes to the latest, we cannot but mention GTR, LTR, Edump, Adump, UPS, UPX, apack these good software abroad, each of them have their own characteristics, it can be said that all kinds of "shell" in the latest representative of the current. (Please refer to my homepage for these software and details) because WINDOWS 3.1 is only a graphics shell based on DOS, so the "shell" software in this platform is very few, see just like Packwin and so on a few limited compression tool, finally difficult to reach a figure. It may be that MICROSOFT retains many of the technical secrets of WIN95, so even WIN95 has been out for more than 3 years and has not seen the shell software running on it. Until the middle of the 98, such software was delayed, and this time WIN98 has been published for some time. It should be the experience of the DOS, this kind of software is not published by the Self can, a publication on a large number of rushed out. First shell-like software such as: Bjfnt, Pelocknt, and so on, they appear, exposing more than 3 years of WIN95 under the PE format EXE file has been very good protection. Everyone should know that many WIN95 software are now used to distinguish between the methods of registration code, determine the legal and illegal users of the bar, with this type of shell software, this registration method of security improved a lot, if you also have their own WIN95 procedures, we must pay more attention to this type of software. And then there's the compression software, because WIN95 run under the EXE file "volume" is generally relatively large, so its practical value than DOS compression software is much larger, this kind of software is also many, earlier VBOX, Pepack, Petite and recently published Aspack, UPX are among the best. In DOS very popular compression software Wwpack's author also introduced corresponding WIN95 version of the WWPACK32, because the performance is not very prominent, so the use of people are not too much. Because the compression software is also indirectly to the software shell, so use them to deal with EXE is also a lot of software authors like to do things, recently published a lot of software can see these packers, compressed software name. There must be shells, under the WIN95 of course is no exception, but because this kind of software than the preparation of shell software is much more difficult, so so far, I think only procdump this software can be called universal Shell software, it can deal with most of the Packers, compression software added to the shells, Is indeed a rare boutique. Other shelling software is specifically for a certain shell software and compiled, although targeted, good results, but the collection of trouble, and this kind of shelling software is not much. Some time ago the TR author also complied with the trend to publish the WIN95 version of tr: TRW, the current version of the shell can be dealt with is not much, to be improved. BW's author Ding-boy The latest release of a WIN95 EXE-Packers software DBPE. Although it is not very mature, but it can add to the use of the software date limit This function is not the other shell software, or later the Shell software will really be as he said it can: add and compress the shell and the same, and the use of the date, plus the registration code, plus the Software Dog (disk) protection, plus hardware serial number discrimination; ... 。 PostScript: For a long time did not write how long things, write written, it is difficult to use an article can be said to finish the topic, so decided to write the first "shell" history, development, types and so on. If you can reflect on it, then sometimesAnd then make up its sister to explain how to shell, shelling, shelling software use, skills and so on. Welcome everyone to give me the opinion, my email is: WCX98@163.NET, thanks again for your reading. 1 2 3 4 next page >> content navigation to force (0 votes) (0 Votes) nonsense (0 Votes) The professional (0 votes) The title party (0 Votes) passed (0 Votes) The original text: teach you step-by-step encryption and decryption technology--compression and shelling (2) (1) Return to network security home
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.