I was reading a article on here about Ollydbg and program cracking. The article was published two years ago and so I wasn't sure if there are newer methods to go about doing this. How would you go about cracking a particle program?
Forum Thread: How Would You Go About Cracking a Program?
- Hot
- Active
-
Forum Thread: How to Track Who Is Sms Bombing Me . 4 Replies
2 mo ago -
Forum Thread: Removing Pay-as-You-Go Meter on Loan Phones. 1 Replies
2 mo ago -
Forum Thread: Hydra Syntax Issue Stops After 16 Attempts 3 Replies
2 mo ago -
Forum Thread: moab5.Sh Error While Running Metasploit 17 Replies
3 mo ago -
Forum Thread: Execute Reverse PHP Shell with Metasploit 1 Replies
4 mo ago -
Forum Thread: Install Metasploit Framework in Termux No Root Needed M-Wiz Tool 1 Replies
5 mo ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 35 Replies
6 mo ago -
Forum Thread: When My Kali Linux Finishes Installing (It Is Ready to Boot), and When I Try to Boot It All I Get Is a Black Screen. 8 Replies
6 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 12 Replies
7 mo ago -
Forum Thread: Hack Instagram Account Using BruteForce 208 Replies
7 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
9 mo ago -
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 22 Replies
9 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
9 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 21 Replies
10 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
10 mo ago -
How to: Crack Instagram Passwords Using Instainsane 36 Replies
10 mo ago -
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 5 Replies
10 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
10 mo ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 55 Replies
11 mo ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 10 Replies
11 mo ago
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
-
How To: Escape Restricted Shell Environments on Linux
-
How To: Find Vulnerable Webcams Across the Globe Using Shodan
-
How To: Top 10 Things to Do After Installing Kali Linux
-
How To: Buy the Best Wireless Network Adapter for Wi-Fi Hacking in 2019
-
Steganography: How to Hide Secret Data Inside an Image or Audio File in Seconds
-
How to Hack Wi-Fi: Get Anyone's Wi-Fi Password Without Cracking Using Wifiphisher
-
How To: Fix Bidirectional Copy/Paste Issues for Kali Linux Running in VirtualBox
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
-
How To: Brute-Force FTP Credentials & Get Server Access
-
How To: Hack Networks & Devices Right from Your Wrist with the Wi-Fi Deauther Watch
-
How To: Use Ettercap to Intercept Passwords with ARP Spoofing
-
How To: Get Root with Metasploit's Local Exploit Suggester
-
How To: Write an XSS Cookie Stealer in JavaScript to Steal Passwords
-
How To: Use Pupy, a Linux Remote Access Tool
-
Hack Like a Pro: How to Hack Remote Desktop Protocol (RDP) to Snatch the Sysadmin Password
-
How To: Create & Obfuscate a Virus Inside of a Microsoft Word Document
3 Responses
This is called "reverse engineering". It's a very big topic, but for some basic concepts you can start reading my article about IDA Pro and Hopper here on Null Byte.
Also wait for advices from people with more knowledge than me (EDIT: they came, scroll down the page!).
EDIT: I've just seen the article you are talking about. As you can see, a requirement is the software IDA, which I explain the mechanics in my post.
EDIT: you can find it here:https://null-byte.wonderhowto.com/how-to/binary-patching-brute-force-reverse-engineering-with-ida-and-hopper-and-hex-editor-0157194/
That's a pretty generic question with a lot of ways to answer it, mostly because it depends on the type of program you're wanting to reverse engineer (crack).
For example, to RE newer .NET apps require tools like .NET Reflector; older programs coded in more traditional languages like C++/Delphi for example you can use regular debuggers like OllyDbg (I used to use SoftICE but it's dead now), Classic VB (VB5/6, etc.) had tools like SmartCheck, Android apps have their own set of tools and so on. IDA is often useful in most of the types in one way or another to see the disassembled listing of the code.
It's a long road of learning and rolling up your sleeves and just digging in and watching as things happen in the program while you play with making your own changes in it and seeing how it affects the app. The tools are the most important thing to making life easier for you along the way, of which there are MANY.
Excellent and thoughtful response, Stardogg.
Welcome to Null Byte.
Share Your Thoughts