Questions tagged [cracking]

Activities to break into computer(s) or technology systems without authorized access.

Questions requesting assistance with compromised sites rarely belong on Stack Overflow and generally should go to the sister site security.stackexchange instead.

243 questions
0
votes
2 answers

Secure network traffic c#

I'm developing a program in C#. It connects to the internet to see if this copy is valid. Currently I'm just sending the licence key and getting a response (0 or 1) if the key is valid. The problem is that some users just fake the data with some…
user1392060
  • 187
  • 1
  • 1
  • 6
0
votes
1 answer

Crack some exe file - how to remove bytes

Today I am trying to remove some bytes from an EXE file. Inside the EXE I found a path to a file that the EXE needs to load. I want to change the path, and to do that I have to remove some ../../ characters. When I do that and save the file, it…
ali
  • 10,927
  • 20
  • 89
  • 138
0
votes
1 answer

apk file that cannot be decompiled

I have been searching over the internet and in the stackoverflow as well and found that and apk file CAN BE de-compiled with some efforts using dex2jar and then there are many de-compilers for jar files. Some people told me that ProGaurd can…
Nishant Soni
  • 658
  • 1
  • 9
  • 19
0
votes
2 answers

Which method of deployment creates a program that is harder to

I've written a program in MATLAB and I'm considering three methods of deploying the program to end users. The first method involves converting the .m files to p-code and then deploying that to end users who can use the p-code in MATLAB but cannot…
0
votes
1 answer

Can i break Adobe PDF password encryption with RC4/AES 128bits?

I've encrypted some pdf files with iTextsharp lib and using AES 128bits and key length = 16bytes(protect reading).Can anyone break password or some app can do that? Thank so much.
The Bird
  • 397
  • 2
  • 8
  • 19
-1
votes
1 answer

Using John the ripper without passwd file

I trying to use John the ripper to crack hashes but I only have access to the shadow file and not the passwd file. I was wondering if there was way to crack the hashes with only the shadow file. Also I have been given permission to crack these…
m123332
  • 21
  • 3
-1
votes
1 answer

Can we find the hashing type of the password?but it is strored in system

Isn't the password hashing type stored with the hash? Otherwise how would the system verify the password without knowing the hash type?
-1
votes
2 answers

Getting SHA1 through programming

This is a something like signinig report's my app: Variant: release Config: config Store: C:\Users\Superman\Desktop\web.jks Alias: web MD5: 8C:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00 SHA1:…
Super Man
  • 49
  • 1
  • 9
-1
votes
1 answer

Generate rule-based passwords with John the Ripper

I am trying to recover a password I have not used in a long time. I know the words used in the passphrase, but I do not remember exactly the character substitutions, and upper/lower case I have used. I only remember some, and know the possibilities…
lyndhurst
  • 33
  • 4
-1
votes
1 answer

How can I change BNE instruction to BEQ and change its argument?

I have the following code after disassembling an arm program. How can I change bne instruction to beq in binary of this program? And how can I change bne jump offset? e50b0008 str r0, [fp, #-8] e50b100c str r1, [fp,…
diduk001
  • 202
  • 1
  • 11
-1
votes
2 answers

How to ignore execution of some line of binary file?

I want to make my program more strong in front of hackers, so i have a program::validator class which validate my environment by some parameters. I : Compile program::validator shared library. Compile program using -O2 and --ffast-math and link to…
Kate
  • 561
  • 4
  • 11
-1
votes
1 answer

hashcat - toggle-case dictionary attack (case sensitive)

I'm new to computer security but I'm trying the same to make a toggle case attack starting from a dictionary password. I read there that it's possible to alternate uppercase and lower case word starting from a dictionary to have all combinations…
user13104092
-1
votes
1 answer

How to create a breakpoint using ollydbg for a winApi function call, e.g. a breakpoint for a GetDigiItemA function call?

Ollydbg v.1 or v.2 I mean the types of breakpoints that could be set up in SoftIce during the program execution, e.g. getDigiItem, setDigiItemA.
Inum
  • 53
  • 1
  • 7
-1
votes
2 answers

Jack the ripper zip password cracking process - unshadow

Anyone know the usage/commands for zip2john/rar2john. I have the bleeding-jumbo version of John the ripper installed. I have a my password locked zip file (file.zip) and a unzipped word list (Rocktastic12a). Im trying to understand the process (not…
Chezzers
  • 53
  • 1
  • 10
-1
votes
1 answer

how to fix resources of unpacked .exe file

I want to translate a program but this program is packed.I unpacked program but can't change menu or dialog or other resources of program by resource editing tools,because resources divide to other section.please help me how can I fix or collect …
amir
  • 1
  • 1