Top 10 cracking tools for Shared Software

Source: Internet
Author: User
Tags ultraedit

 

There are many factors that affect the development of shared software. Illegal cracking can be said to be the top competitor of shared software. So what weapons are used by crackers that make shared software difficult to survive? Today, let me show you the ten categories of mysterious cracker software, which are the top ten killers of shared software!

I. debugging tools soft-ice and trw2000. Download: TRW2000 V1.22

Soft-ice is currently recognized as the best tracking and debugging tool. Using soft-ice, you can easily track software errors or monitor software errors for debugging, it has versions on dos, window3.1, win95/98/nt/2000/platforms. This tool is used to debug, track, and debug software. It becomes the most terrible cracking tool in the hands of cracker. trw2000 is a debugging software compiled by the Chinese people, fully compatible with various commands of soft-ice, because many software can detect the existence of soft-ice, but the trw2000 detection is much worse, so it has become a favorite of many cracker. Trw2000 is specially optimized for software cracking. It tracks debugging programs in windows and has stronger tracking functions. It can set various breakpoints and more breakpoint types; like some shelling tools, it can remove the encrypted shell and automatically generate exe files. Therefore, it is more powerful in cracking, which poses a greater threat to the development of shared software in the hands of hackers. It also has a dos version named tr.

Ii. Disassembly tool wdasm8.93 gold edition and hiew download: hiew shell decompilation Tool

Cracker often compares soft-ice and trw2000 to the Dragon-killing knife, and wdasm8.93 to the Yi tianjian. Wdasm8.93 can be used to easily disassemble programs. It can analyze program flows statically or dynamically. On the basis of the original normal version, some hackers developed the wdasm8.93 gold version, which enhanced the extraction of Chinese strings. The threat to domestic shared software is even greater. For example, happy landlords, this very interesting sharing software, with the gold version of its disassembly can directly see the registration code, the normal version is not, you say it is amazing? Hiew is a hexadecimal tool. In addition to common hexadecimal functions, hiew also has a unique feature that can disassemble files and modify programs using assembly commands, convenient and quick! This is also a common static Disassembly tool for cracker.

3. smartcheck, A visual basic program debugging tool. Download: DEKSI SmartCheck V2.0

This is a debugging program for visual basic programs. Because vbprograms are interpreted and executed in essence, they only call vbrunxxx. dll functions, so the executable files of vb are pseudo code, and the programs are all in vbxxx. dll. If soft-ice is used for tracking and debugging, it can only be used in vbdll. There are no useful things, and the code quality is not high, and the structure is complicated. Of course, as long as you understand its features, soft-ice can also be used to crack, but the appearance of smartcheck greatly facilitates cracker. Smartcheck is an excellent tool for debugging, interpreting, and executing programs exported by numbench. The latest version is v6.03. It is very easy to use, and you can control it easily without knowing the assembly language. It records the operations executed by the vbprogram, making it easy for the attacker to crack most vbprograms.

4. hexadecimal editor ultraedit. Download: UltraEdit-32 V12.10a _ text editing tool _ Green Special Edition

The hexadecimal editor can edit a file in hexadecimal mode and modify the content of the file. Although hiew is a hex tool, it is a dos interface, so many hackers have prepared a tool for windows. There are many such tools, such: ultraedit, winhex, and hex workshop. Among them, ultraedit has its own characteristics, is easy to operate, and is available in Chinese versions. It is a very good hexadecimal editor. We recommend that you use it.

5. Download registry monitoring tool: Regshot green Regmon green RegSnap green

Mainly include regshot, regmon, and regsnap. In Microsoft, many settings are stored in the registry. The Registry is the core database of windows, and various parameters are stored in the table, it directly controls windows Startup, hardware driver loading, and the normal operation of some windows applications. When installing the application software, you may include necessary information, such as the installation time, usage, and registration code. Regshot, regmon, or regsnap is a tool used to monitor registry changes. It can be used to understand and monitor the actions of applications in the registry. Hackers often use them to monitor the changes of applications in the registry.

6. File monitoring tool filemon.Download: Filemon Green Edition

You can monitor the running status of a specified file in the system. For example, you can specify which file is opened, which file is closed, and which file is read. It monitors any read, write, and open operations on a specified monitored file, and provides complete report information. Hackers often use filemon to monitor the file system, so that they can understand what operations the program has done when it starts, closes, or verifies the registration code, and then decrypt the Code accordingly.

7. Shell removal tool procdump. Download: ProcDump32 1.6.2 FINAL

Nowadays, many software are shelled. "shell" is a program dedicated to protecting the software from unauthorized modification or decompilation. They generally run programs before they get control and then complete their tasks to protect the software. The shell software cannot see its real hexadecimal code when tracking, so it can protect the software. Procdump is a shell removal tool to handle software shelling. It can peel off a lot of shells and restore the original face of the file, so it is much easier to modify the file content. Because it also allows users to write their own script files, it can take off the shell of the new shell software. It is also an excellent pe format modification tool and an essential tool for shelling!

8. download the file detection tool: Fileinfo

Such tools include typ, gtw, fileinfo, and shock wave 2000. They are used to detect the software shelling type, where shock wave 2000 can easily find any entry point of the encrypted shell, including asprotect and phantom encryption shells. This type of software is generally used with procdump and debugging software. Use them to find the program shelling type and use procdump, soft-ice, and trw2000 to shell the program.

9. Resource modifier exists. Download: exbench with registration Machine

Exists is a powerful tool that can modify software resources. Exclusive can analyze and display different information without resource files, and rewrite the resources of executable files, including (exe, dll, ocx. It can directly modify the resources of programs compiled with vc ++ and delphi, including menus, dialogs, and string tables. It is a common tool for Chinese software. In the hands of the attacker, it is often used to modify the menu, dialog box, string table, and so on in the file resource to display the information required by the hacker (such as changing the copyright information ), to modify the software.

10. Call the query tool api spy.

As the name suggests, this program is used to detect which APIs are called by software. The api is the function called during windows program execution. It is similar to the int (Interrupt) in dos. windows provides many such functions for program designers to apply, the main purpose is to save time for software development and facilitate software development. The api spy is such a software that monitors api calls. It can check which APIs are called by the application to obtain api call information useful to the hacker and set breakpoints through these api calls, to crack the software. It can work on the windows95/98/nt/2000 platform.

The software mentioned above is "legitimate" software, but it only plays a different role in different users. It is like a gun. in the hands of the people's army, it is a weapon to protect the country, and in the hands of evil people, it is a weapon. You must never be so arrogant about these software!

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.