Questions tagged [cracking]

Activities to break into computer(s) or technology systems without authorized access.

Questions requesting assistance with compromised sites rarely belong on Stack Overflow and generally should go to the sister site security.stackexchange instead.

243 questions
0
votes
1 answer

How SQLMAP fetches tables, columns from the database?

I have understood that how SQLMAP checks for vulnerabilities but now i'm fascinated about how after getting the vulnerability SQLMAP fetches the databases, tables, columns. I tried to understand by looking on their github repo but still.
0
votes
1 answer

PHP Markdown/file editor Security

so I am working on a super simple blog that uses the markdown format with rss.reader for the posts. It is extremely simple yet complicated for the people that I want to be able to make posts. So I have created a simple "file creator" if your will…
Juan
  • 531
  • 4
  • 8
0
votes
1 answer

How to improve a brute-forcing algorithm using groups?

I got an excercise in which I have to guess a password using a brute-forcing algorithm. The charset is 'a-z' and the length varies between 3 and 6. With 2GB of RAM I'm getting memory allocation errors after a couple of hours on the examples with 5…
user1351781
0
votes
2 answers

Error exception causing print to fail - python2

Here is a snippet from my code. For some reason it simply won't print out the second line saying "Cracking took 10 seconds" or whatever, but this first bit saying Password Found: does work... Why? def connect(host, user, password, release): …
Coder77
  • 2,203
  • 5
  • 20
  • 28
0
votes
1 answer

Pass database handler to exception

I want to log something into the database when an attack is detected. The class definition and throwing go separated, but joined them here for simplicity. I was thinking about:
Francisco Presencia
  • 8,732
  • 6
  • 46
  • 90
0
votes
1 answer

Propability formular for scrypt blocks

I am currently reseaching and looking for a formular to calculate propability for solving blocks in scrypt. Just something like https://www.litecoinpool.org/calc where one enters hash rates/second and sees their propability of solving blocks. Please…
0
votes
2 answers

Build successful not shown after adding one more thread, Password cracking pipeline

I am making pasword cracking program(webster dictionary comparing and finding matches) as a school assigment. It is pipeline architecture using threads and bounded buffers. First question would be: Why it is even slower than centralized pasword…
0
votes
1 answer

How can avoid to iphone application cracking?

Possible Duplicate: Reducing piracy of iPhone applications i built an application for iphone and i want to avoid cracking my app ... like this : alt text http://www.freezpic.com/pics/b8d3f07a6a708de18033394010adee8d.PNG i donn't problem with…
Mc.Lover
  • 4,813
  • 9
  • 46
  • 80
0
votes
1 answer

Getting information from a USB activation program

My colleagues work with AutoCAD 2010 plugin called RCAD ( not sure if it is the correct name), but it works only on Windows XP installed on a Virtual Machine and It activates when they insert a specific usb.I need to develop the same pluggin in…
Antonio Papa
  • 1,596
  • 3
  • 20
  • 38
0
votes
1 answer

How to authorize a file to be opened in just one device using encryption

I have developed a software that opens encrypted files. the files are Encrypted with the key generated from a Mixture of Device Hard Disc Serial and Mac ID In the server side. In Order To prevent that File to be Opened on any other Device, In…
Saeed.Torabzadeh
  • 121
  • 2
  • 10
0
votes
2 answers

Load Dll without execute dllmain function

I want to load special dll without execute dllmain function. I think, set a breakpoint at dllmain can solve this problem. But I don't know How can I do? Also I want call dll's export function. I have tried to use LoadLibraryEx with…
bTagTiger
  • 1,261
  • 5
  • 23
  • 38
0
votes
0 answers

Easy way to change tcp packet header in compiled executable?

I have executable (written probably in c++), which is connecting to the serverside software using tcp and windows sockets (win sock api). Then it sends packet with header (for example header is two bytes 0x0064), login and password. And then starts…
splattru
  • 608
  • 1
  • 9
  • 19
0
votes
1 answer

why is ECSDA signature in software protection useful? as they can be jumped over

I was reading some book and mentioned so called ECDSA ( The Elliptic Curve Digital Signature Algorithm ) is used to generate serial numbers which are difficult to crack My understanding is that we can always STATIC/DYNAMIC analysis the assembly and…
zinking
  • 5,561
  • 5
  • 49
  • 81
0
votes
2 answers

How to guess next instruction to execute in assembly with dynamic memory

A friend of me challenged me to hack a small program he coded. Basically, it is an exe file that displays an image but in order to do so you need a key file with a password. I started to reverse engineer it with ollydgb and I was able to figure out…
0
votes
1 answer

Securing Desktop Application by adding logic to WebService

I recently launched my desktop application and it got cracked after a few days. I posted a question on stack overflow and people said that i cannot stop that. In the start of the software i cannot allow this to happen and i want a solution. So,…
Behroz Sikander
  • 3,885
  • 3
  • 22
  • 36