Knowledge, principles, and skills on brute-force cracking

Source: Internet
Author: User
Welcome to the network security forum and interact with 3 million technical staff. I 'd like to introduce you to the brute-force cracking knowledge and experience today. Of course, this is my personal experience, but there should be other experience for the experts. If you think that my experience is insufficient, I hope I can write a letter to supplement it. Start introducing violence now

Welcome to the network security forum and interact with 3 million technical staff> I 'd like to introduce you to the brute-force cracking knowledge and experience today. Of course, this is my personal experience, but there should be other experience for the experts. If you think that my experience is insufficient, I hope I can write a letter to supplement it. Start introducing violence now

Welcome to the network security forum and interact with 3 million technical staff> enter

Today, I would like to introduce my knowledge about brute-force cracking and my experience in brute-force cracking. Of course, this is my personal experience, but there should be other experience for the experts. If you think that my experience is insufficient, I hope I can write a letter to supplement it.

Now we will introduce the principles of brute-force cracking. For brute-force cracking, it is often difficult to obtain the registration code or the calculation process of the registration code is too complicated, and cannot be calculated normally (here, the anti-Push method is used to calculate the registration code) so we can use the method of modifying the program to crack the software, which is usually brute force cracking.

Now we can split the software that uses brute-force cracking into different types to let everyone know how to crack the registration code or brute-force cracking of different software.

1. Test Software

This type of software is used for testing and generally cannot be registered. Therefore, it has only one time bomb limit and can only be used for brute force cracking. Just remove the time bomb.

2. registration code input is not required in Shared Software

This kind of software is relatively mature, but the author usually does not use the registration code protection software, but only makes a time bomb, the same as above, so the cracking is the same as above.

3. The registration code calculation process in shared software is too complicated

This software is designed by the author to use a very complex computing process. You cannot obtain its registration code using reverse push, so it can only use brute force cracking to use this software.

4. Prompt window for sharing software

Generally, this kind of software has a prompt window when it starts to run. the most annoying thing is that some software Prompt Windows have certain time requirements. You need to wait 10 seconds to run the software, therefore, brute-force cracking is usually used to crack it. (This does not include cracking the registration code)

5. Key File Protection for Shared Software

For such software, it is usually difficult to decrypt people, but it is quite easy to use brute force cracking. You only need to find the right place to crack it.

6. Shared Software shelling

This type of cracking is the most difficult of brute-force cracking, because if you have no knowledge about shelling, you will not be able to use brute-force cracking to crack the software. Therefore, we must have a good knowledge of shelling to deal with this attack.

Now let's take an example to explain how to perform brute force cracking.

Brief Introduction: A software installation program can be used to create very small installation files and support Win95/98/NT. The files created with it are very small and only 2-3 kb, SETUP is not required. EXE file, you just need to right-click and choose Install, but you can also use it to create a file containing SETUP. the INF package of the EXE file. It can generate one or more ZIP or EXE files. It uses INI file and can be packaged in multiple languages.

[1] [2]

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.