Originally posted by: torpid
For games and such, I would guess a lot of it is examining assembly code and using disassemblers. There is also the fact that many protection schemes are published. To my knowledge cd keys are becoming really hard to crack, and often times illegal copies of software use a generic key rather than generate or calculate one.
Originally posted by: mrCide
free kevin
Originally posted by: gigapet
anybody can learn a programming language this is the sort of stuff they should teach you in college.......i feel ripped off.
Originally posted by: polm
"purposely obfuscated" :roll:
Hacking 101.Originally posted by: gigapet
anybody can learn a programming language this is the sort of stuff they should teach you in college.......i feel ripped off.
Originally posted by: Descartes
Originally posted by: polm
"purposely obfuscated" :roll:
Do you have a problem with that?
Originally posted by: bmacd
I've always thought that companies would use these difficult algorythms to try and defeat piracy, yet there's a crack out there for every program that requires this. Are these guys mathematicians or do they just know where to find a weak spot in the copy protection?
-=bmacd=-
Originally posted by: Ameesh
Originally posted by: bmacd
I've always thought that companies would use these difficult algorythms to try and defeat piracy, yet there's a crack out there for every program that requires this. Are these guys mathematicians or do they just know where to find a weak spot in the copy protection?
-=bmacd=-
hackers are not cracking any encryption algorithms, what they are doing is sitting down and modifying the original binary to skip instructions that it normally would execute normally by inserting a jump instruction where none exsisted before. It's a fairly painful process but not all that difficult if you know what your looking for.
Originally posted by: bmacd
I've always thought that companies would use these difficult algorythms to try and defeat piracy, yet there's a crack out there for every program that requires this. Are these guys mathematicians or do they just know where to find a weak spot in the copy protection?
-=bmacd=-
Originally posted by: Descartes
A crack is not the same thing as a code generator. A crack generally circumvents the functionality that checks for licensing, and a code generator actually generates a proper license number. There are quite a number of ways to crack an app, and it's obviously contingent upon how it was developed, but a generally successfull process is as follows:
- Launch the app you wish to crack
- Launch an interactive debugger
- Attach to the app
- In the app, go to the section that requires a license. If it prompts you, you're golden; if not, it's a little more difficult.
- You can search the binary for the text that prompted you, and this will give you the general address in the binary that you need (this is the simplest part, and I'm not going to explain what to do if it doesn't prompt you)
- Disassemble the binary, and find the literal text used in the prompt. This will give you the general address for the assembly instructions that you need.
- Trace back the assembly instructions until you find the "jump point"; this is usually a jmp (or a derivative) instruction that calls a license validation procedure. Different applications implement this differently.
- Once you find the jump point you can then insert assembly NOP instructions (hexadecimal 0x90) in place of the instructions for the jump. This is effectively a "no operation", and as a result the license will be ignored.
Anyway, I purposely obfuscated some of the parts, but that gives you all the general idea.