473,770 Members | 5,569 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Posting Etiquitte?

I hear people say not to multipost, does these mean not to ask the same
question in another group or to submit the question to all the groups via
the same submission, with multiple newsgroups in the "send to" box? Just a
curious question from someone who has only googled and altavista'd since the
beginning of time.

Jeff
Nov 20 '05
62 3461
Hi Nick, Mark,

|| http://www.counterpane.com/crypto-gr....html#snakeoil

#snakeoil - LOL.

Regards,
Fergus
Nov 20 '05 #61
Hi Guys,

Here's one cracker's view - [name changed to reduce the infamy].

[ps. For anyone who disapproves of me posting this publicly - this
material and much more like it (and 'better') is readily available out there.]

<quote>
Hi All!
I'm Stoopid The Cracker and In This Tutorial I'll Explain you How To Crack
Any type of registration protection.
First of all.Use Softice cause i don't like Live Approch.
Ok
Run Your target program and go on the registration dialog,then put
in the dialog any name and any serial number but DON'T press OK
before press "control+d" to pops up softice and in softice sets some
Break points.......fo r approching with a registration routine we must
breakpoint on api(windows functions) used to read Your name and Your
Sn.
They are
Getwindowtext
GetwindowtextA
Getdlgitemtext
GetdlgitemtextA
Hmemcpy (that's not an api but it's the best)

Well the "A" after the api means 32 bit so if your program is 32 bit
put the A if not don't.Easy!
I always use only Hmemcpy cause it runs 99,9% of the times.
Well now exit from softice by pressing control+d and press ok,if you have set
a working bpx softice will pops up.

Now start the real cracking.....
Press F12 until you can read on the bottom line of SoftIce the name
of the file of the program you're cracking....
then if before your location there's a call ok,if not press again F12 until
you find it.
Then you must step into the code.....(by pressing F10),if in your stepping you
find some
condictional jumps have a look at them......btw step until you find a call
that prompt you
something like a messagebox or something else that prompt you the "You
entered a Wrong code",
well before that call you noticed a condictional jump that jumped on that call
or dindn't jump
over that call....if yes try to inverse the jump (change a jz into a jnz)
or (a better way) change the value of the eip in order to make that jump to
jump or not.
Doing this if you find the good jump the program must prompt you "Thank for
Registering this
fucked program",
now the crack is near to the end...
Often cracking this way you will only prompt the "You Are Regged" but the
program still continue
to be unregged so in order to crack it 100% and easly there are 2 ways

1) trace into the call BEFORE our important condictional jump and try to
understand the code,
in order to find the real compare instrucion that often is kept in this call
not out....if
you find out our real compare instruction,and change the below condictional
jump in order to
make it jump or not(it depends if it before jumped or not,do the reverse).
Ok now the program should be fully cracked!

2) this is a worse way than the first but it works!This way is easyer for
beginners
You must trace into the call before our important codictional jmp,and then put
a bpx in its first line,then press "x" and exit from softice and use the
program in all its functions,creat e new,open,about, save, and when softice pops
up press "f12" in order to get out that call and look for a near condictional
jump and try to inverse it and look if the program looks like regged, you must
sign up all these condictional jump and inverse it,and your program is
cracked!

Stoopid the Cracker

</quote>

The point is that it is very easy to bypass any security where there is
any easily identifiable and accessible central point. The two best types of
protection are methods that are impossible to crack through sheer
sophistication (whatever that might entail and whenwver someone designs one)
and those that are simply too much effort or too fuzzy.

I would favour a distributed approach where detection of illegality in the
registration or files, etc, leads to a delayed degradation of services, say a
random number of hours/days/keypresses/etc after detection - implemented by
changing encoded settings/menus, or whatever. This means that a hacker would
have to be very dedicated, methodical and patient - and he can never release
the cracked product without wondering if there is some two-week time-bomb
still waiting to disable the program.

The initial registration procedure would make it <very clear> that
tampered-with program <will> fail and include a well-worded disclaimer.

Such a scheme is a challenge to design and implement, probably hell to
test, too - but even more of a challenge to break. ;-)

Regards,
Fergus
Nov 20 '05 #62
Cor
Hi Fergus, mostly this is true,

Tell someone "You cannot and..........
Such a scheme is a challenge to design and implement, probably hell to
test, too - but even more of a challenge to break. ;-)


And not to forget the times your nice protection scheme goes wrong.
Activate a helpdesk for that.

I've heard many times that people had problems with Internet.
Often that was because the firewall did close everything.
But it has a benefit, you don't get spam
:-))
Cor
Nov 20 '05 #63

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

145
6373
by: David MacQuigg | last post by:
Playing with Prothon today, I am fascinated by the idea of eliminating classes in Python. I'm trying to figure out what fundamental benefit there is to having classes. Is all this complexity unecessary? Here is an example of a Python class with all three types of methods (instance, static, and class methods). # Example from Ch.23, p.381-2 of Learning Python, 2nd ed. class Multi:
2
1849
by: Jonathan M. Rose | last post by:
I am looking for a script that I can sit on an HTML server (Linux, Apache, PHP/Perl/Python/Etc.) that will allow me to do the following things: 1) Post news articles that consists of (i) a title and (ii) a body. 2) Show the last X posts (or, better yet, just the last X titles) on a home page. 3) Show all posts on a "news" page. 4) When a news article is posted, email the news article (with the title being the email subject and the news...
21
4251
by: Davinder | last post by:
can anyone recommend a good tool to convert documents to HTML on the fly. I need to integrate this tool with a VB app so it must have an API. thanks in advance Davinder davinder@gujral.co.uk
12
3879
by: * ProteanThread * | last post by:
but depends upon the clique: http://groups.google.com/groups?hl=en&lr=&ie=UTF-8&oe=UTF-8&threadm=954drf%24oca%241%40agate.berkeley.edu&rnum=2&prev=/groups%3Fq%3D%2522cross%2Bposting%2Bversus%2Bmulti%2Bposting%2522%26ie%3DUTF-8%26oe%3DUTF-8%26hl%3Den ...
54
6830
by: Brett Baisley | last post by:
Hello, I am trying to figure out how to change the default font-family and font-size. I tried adding this to the BODY section, but it didn't work. I tried to the P section, but they are not enclosed in <P> tags. They are just basic fonts. Can anyone help? Thanks!
33
2535
by: Philip Herlihy | last post by:
I'm creating a common navigation bar of text "buttons" using CSS. On each page, I want the corresponding button to be "inert" (no hover, etc) as a visual clue to where you are. I thought I'd include simple <p> tags, and style them the same way as the <a> tags, but I can't get it to work - I get different margins in each case. I've reduced the situation to the essentials here: http://philipherlihy.members.beeb.net/CssMargins/
3
2925
by: Roger Walter | last post by:
I have a .Net web page that is posting twice after the submit button is clicked once. How can that happen? I have turned tracing on and it writes two records to the trace log and posts twice. Is this possible? What can I do to stop this from happening?
44
2979
by: Bruce Wood | last post by:
This subject has come up several times in this group over the last year. Several people in this group seem to feel strongly about this topic. Rather than derail other threads with this discussion, I figured we could talk about it here. Since I'm leading off here, I'll state my opinion on the matter. I really don't care one way or the other. I use Google, and for all its faults, does do one thing right: it hides quoted text. So, I just...
27
1821
by: Alan T | last post by:
I am not sure which way to go: Want to learn C# but C# is implemented both in Windows desktop application and ASP.NET. I am not familiar with web programming, should I start with Windows app or ASP .NET?
0
9592
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
10059
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
10005
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
1
7416
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
6679
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5313
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
1
3972
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
3576
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
3
2817
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.