Questions tagged [cracking]

Activities to break into computer(s) or technology systems without authorized access.

Questions requesting assistance with compromised sites rarely belong on Stack Overflow and generally should go to the sister site security.stackexchange instead.

243 questions
5
votes
1 answer

Forgot the username and password of *fdb (firebird) database. Is there anyway I can crack this database?

I have database of firebird of more than 8 GB and I want to migrate all the data from it. But I have forgotten the username and password. Is there anyway or any tool through which I can crack this database and can get my data back?
5
votes
1 answer

reduce my app cracking (cocoafob)

I am using cocoafob for licensing. Unfortunaletly my app is always cracked quickly after each release. Is there a way do make this a little more difficult?
AP.
  • 5,205
  • 7
  • 50
  • 94
5
votes
4 answers

SP (Stack Pointer) Anti-debug Trick - x86

Listing 7.1 The Decryptor of the Cascade Virus lea si, Start ; position to decrypt (dynamically set) mov sp, 0682 ; length of encrypted body (1666 bytes) Decrypt: xor [si],si ; decryption key/counter 1 xor [si],sp ; decryption…
5
votes
1 answer

"Invalid JSON primitive: alihack" errors coming from an ASP.NET MVC site

We started to get multiple such errors daily, appearing in the Event Log: Invalid JSON primitive: alihack. at System.Web.Script.Serialization.JavaScriptObjectDeserializer.DeserializePrimitiveObject() at …
Piedone
  • 2,693
  • 2
  • 24
  • 43
5
votes
2 answers

Editing assembly in WinDbg

I have been trying to solve some "crackmes" (from http://crackmes.de) using WinDbg. Most of the solutions I have looked at involve using Olly Dbg to make modifications to the assembly; is there a way to do this in WinDbg?
Chris Finley
  • 3,901
  • 5
  • 24
  • 32
4
votes
3 answers

What is difference between just typing a command in Linux and typing the same command after executing '/bin/sh'?

I understand that /bin/sh is a shell that executes commands I have typed. But the thing is that although I don't type /bin/sh, I can type any command I want. I heard that when a cracker wants to attack someone, he or she usually wants to get…
user3628636
  • 177
  • 1
  • 3
  • 8
4
votes
6 answers

What is the Best way to create a program which works only in the predefined trial period(evaluation period)?

I need to create a simple application that doesn't work after 30 days. How can I do that ? Is there a way to use Trial program after 30 days ?
xRobot
  • 25,579
  • 69
  • 184
  • 304
4
votes
2 answers

Google in app purchase and cracking

i developed an app that's become very popular and someone cracked it. I would like to know if someone know, first of all: how?, if someone know any workaround to avoid this. The app is using the in-app purchase as per google example to unlock some…
iGio90
  • 3,251
  • 7
  • 30
  • 43
4
votes
2 answers

Debugging and Analyzing a Trojan

I'm interested in using something like OllyDbg to examine a program that potentially has Trojan-like characteristics. Does anyone know any good tutorials on how to do this safely? Basically the program is a "bot" for a video game, but I suspect that…
user267275
  • 41
  • 3
4
votes
2 answers

Is it possible to crack SHA256, when you know the answer is a coordinate?

I need to crack a sha256 hash, and I know the answer is in coordinates, but I don't know what are the coordinate values example: 3f1c756daec9ebced7ff403acb10430659c13b328c676c4510773dc315784e4e 58.375782 26.742632 Is it possible to create a python…
josh
  • 1,205
  • 4
  • 14
  • 14
4
votes
0 answers

Senselock EliteIV v2.x usb dongle dump or emulate?

OK, I got a Senselock EliteIV v.2.x USB Dongle and I want to emulate the hardware so I can still run the LaserCut 5.3 Software without it ? Here is the link from others which similar with mine :   …
Galvion
  • 1,353
  • 7
  • 23
  • 35
4
votes
2 answers

Best practices to make your android app's in-app purchase process harder to break?

Which steps should i follow to reduce the possibility of illegally activating and using in-app features in an android application? It may be impossible to beat it, however, there should be some basic steps at least to filter out kids...
frankish
  • 6,738
  • 9
  • 49
  • 100
4
votes
3 answers

how do I protect my iOS app from being cracked?

I have $0.99 iOS app and I'm afraid someone would like to crack it. How can I protect my app from crackers?
Valeriy Antonov
  • 141
  • 2
  • 6
4
votes
1 answer

Protecting software with code mutator

This question has been asked before: Have you ever used code virtualizer or vmprotect to protect from reverse engineering? But as it's 4 years old now I felt it would be OK to ask a similar question again, as it's likely things have changed a lot…
Tom Gullen
  • 61,249
  • 84
  • 283
  • 456
3
votes
3 answers

Is NtSetInformationThread safe to use?

I am attempting to implement some very basic debugger protection to prevent kids from using easy tricks to reverse engineer my software. While these simple measures are easy to bypass, they will at least keep out the uninformed. The following code…
Philip Bennefall
  • 1,477
  • 5
  • 20
  • 33
1 2
3
16 17