The power of Crack! Thoughts on Shared Software cracking

Source: Internet
Author: User

Software copyright has always been a security concern. The emergence of Cracker has challenged software copyright protection in a certain sense, keygen, which is continuously released on 0day, makes all sharing software authors or commercial software organizations feel a headache. With the increasing number of computer enthusiasts in China, many Cracker's agitation and uneasiness have stirred up a craze for cracking, many cracking organizations in China are also competing to establish. CCGBCGFCG and other cracking organizations have made the majority of users unable to cope with the attacks. What are the secrets of these hackers in the eyes of outsiders?

498) this. style. width = 498; "align = no>

What we don't know is that everyone is cracking the specific method of each software, but we can understand that most of them have adopted a lot of cracking techniques and ideas, this can be seen in the cracked articles published by Cracker on various cracking forums.

W32dasm and WinHEX are good choices for beginners. First, let's talk about WinHEX, which is a very good software for editing hexadecimal files and disks. It can be used to edit and modify Hex and ASCII codes, and has the RAM editing function, for early shared software, WinHEX shines brightly in the memory by comparing the verification code. After the registration error result is presented, when it compares the correct information with the error information, pulling the key out is WinHEX's housekeeping skill. Unfortunately, with the emergence of large-scale applications restarting the verification mechanism and the mixed encryption control method, more WinHEX will act as the editing and modification tool.

498) this. style. width = 498; "align = no>

At this time, the technical threshold is improved while making those Cracker eager to crack more direct-brute-force cracking. Here, the brute-force cracking is not a brute-force Cracking Method in cryptography. It aims to break through the verification by changing the running process of the source program and modifying new jumps. W32dasm is a good player in this regard! W32Dasm is a static Disassembly tool. It is also a common tool used by hackers. It is also compared to a hacker's removal tool. The number of W32Dasm versions that have been modified on the internet is numerous. The popularity of W32Dasm is obvious. How can it be cracked?

498) this. style. width = 498; "align = no>

Generally, when you run the cracking software and enter your name and any registration code to register the software, an error message is usually prompted and the error message is recorded, then, find the error message in the serial reference, or double-click the left mouse button in the prompt information that may be correct. At this time, you can search up to get a jump such as JNEJE, which is the process of verification of the registration code, what Cracker has to do is drop its JMP or EB and reverse the program.

498) this. style. width = 498; "align = no>

Everything seems to be smooth. In fact, it is much harder to crack, because you don't know what the problem is! Shelling refers to the compression of target file resources and is a common means to protect files. A shelled program can run directly, but cannot view the source code. You can view the source code only after shelling. This is why the serial reference of many programs cannot be viewed in W32Dasm. There are many shelling methods, including tools and manual tools, which are not listed at the moment. After all, this article does not want to discuss how to crack the software. The above are just passive methods. It can be said that today's encryption protection technology is very easy to defend against static cracking. Therefore, the Dynamic Cracking Method promoted by Cracker is more valuable. Why? This method can be said to remain unchanged, but it must have a certain compilation basis and an understanding of the API (especially for Windows systems ).

SoftICE is one of the famous dynamic debugging software. SoftICE is derived from Compuware and is one of the best debugging programs in the DOS environment. In Windows, SoftICE is the first in the world. As a result, many Decryptors cherish it and regard its producer numbench as the most respected company.

498) this. style. width = 498; "align = no>

The TRW2000 is a wonderful piece of software in China. The small and convenient software provides a more concise debugging experience, and everything is under control. Each of them has its own merits. However, as the GUI requirements increase, at present, a software named Ollydbg has come to the fore and has become one of the most popular debugging software. It has both dynamic and dynamic features, user-friendly interfaces, and stable performance in the system, making it easy for many Cracker.

498) this. style. width = 498; "align = no>

498) this. style. width = 498; "align = no>

Dynamic Cracking is uncertain and highly flexible. This is what Cracker uses to say. Generally, software cannot escape here. We can only describe it here for the time being. However, the purpose of this article is not to attack reverse engineering. Although Cracker belongs to this category, at least not all reverse engineering engineers aim at commercial interests and many become anti-virus engineers, many people learn from each other and improve their computer skills (they generally use a demo program called CrackMe to train their hands ). There is no doubt about the contributions and attitudes of these people.

During the Olympics, the country pays more attention to the protection of intellectual property rights. Although Cracker still has a surviving market, with the improvement of the system and the improvement of user quality, piracy will not flood the entire software industry, and copyright protection will not be affected by these Cracker.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.