I was reading a article on here about Ollydbg and program cracking. The article was published two years ago and so I wasn't sure if there are newer methods to go about doing this. How would you go about cracking a particle program?
Forum Thread: How Would You Go About Cracking a Program?
- Hot
- Active
-
Forum Thread: How to Track Who Is Sms Bombing Me . 4 Replies
1 mo ago -
Forum Thread: Removing Pay-as-You-Go Meter on Loan Phones. 1 Replies
2 mo ago -
Forum Thread: Hydra Syntax Issue Stops After 16 Attempts 3 Replies
2 mo ago -
Forum Thread: moab5.Sh Error While Running Metasploit 17 Replies
3 mo ago -
Forum Thread: Execute Reverse PHP Shell with Metasploit 1 Replies
4 mo ago -
Forum Thread: Install Metasploit Framework in Termux No Root Needed M-Wiz Tool 1 Replies
5 mo ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 35 Replies
5 mo ago -
Forum Thread: When My Kali Linux Finishes Installing (It Is Ready to Boot), and When I Try to Boot It All I Get Is a Black Screen. 8 Replies
6 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 12 Replies
6 mo ago -
Forum Thread: Hack Instagram Account Using BruteForce 208 Replies
7 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
9 mo ago -
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 22 Replies
9 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
9 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 21 Replies
9 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
9 mo ago -
How to: Crack Instagram Passwords Using Instainsane 36 Replies
9 mo ago -
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 5 Replies
10 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
10 mo ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 55 Replies
11 mo ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 10 Replies
11 mo ago
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How to Hack Wi-Fi: Cracking WPA2-PSK Passwords Using Aircrack-Ng
-
How to Hack Wi-Fi: Cracking WPA2-PSK Passwords with Cowpatty
-
Locking Down Linux: Using Ubuntu as Your Primary OS, Part 2 (Network Attack Defense)
-
How To: Make Your Own Bad USB
-
How to Hack Wi-Fi: Cracking WEP Passwords with Aircrack-Ng
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
Steganography: How to Hide Secret Data Inside an Image or Audio File in Seconds
-
How To: Stealthfully Sniff Wi-Fi Activity Without Connecting to a Target Router
-
Android for Hackers: How to Turn an Android Phone into a Hacking Device Without Root
-
How To: Exploit EternalBlue on Windows Server with Metasploit
-
How To: Hack Wi-Fi Networks with Bettercap
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
How To: Use Mitaka to Perform In-Browser OSINT to Identify Malware, Sketchy Sites, Shady Emails & More
-
How To: Find OSINT Data on License Plate Numbers with Skiptracer
-
Locking Down Linux: Using Ubuntu as Your Primary OS, Part 3 (Application Hardening & Sandboxing)
-
How To: Run USB Rubber Ducky Scripts on a Super Inexpensive Digispark Board
-
How To: Hunt Down Social Media Accounts by Usernames with Sherlock
-
How To: Pick an Antenna for Wi-Fi Hacking
-
Hack Like a Pro: How to Secretly Hack Into, Switch On, & Watch Anyone's Webcam Remotely
3 Responses
This is called "reverse engineering". It's a very big topic, but for some basic concepts you can start reading my article about IDA Pro and Hopper here on Null Byte.
Also wait for advices from people with more knowledge than me (EDIT: they came, scroll down the page!).
EDIT: I've just seen the article you are talking about. As you can see, a requirement is the software IDA, which I explain the mechanics in my post.
EDIT: you can find it here:https://null-byte.wonderhowto.com/how-to/binary-patching-brute-force-reverse-engineering-with-ida-and-hopper-and-hex-editor-0157194/
That's a pretty generic question with a lot of ways to answer it, mostly because it depends on the type of program you're wanting to reverse engineer (crack).
For example, to RE newer .NET apps require tools like .NET Reflector; older programs coded in more traditional languages like C++/Delphi for example you can use regular debuggers like OllyDbg (I used to use SoftICE but it's dead now), Classic VB (VB5/6, etc.) had tools like SmartCheck, Android apps have their own set of tools and so on. IDA is often useful in most of the types in one way or another to see the disassembled listing of the code.
It's a long road of learning and rolling up your sleeves and just digging in and watching as things happen in the program while you play with making your own changes in it and seeing how it affects the app. The tools are the most important thing to making life easier for you along the way, of which there are MANY.
Excellent and thoughtful response, Stardogg.
Welcome to Null Byte.
Share Your Thoughts