Questions tagged [cracking]

Activities to break into computer(s) or technology systems without authorized access.

Questions requesting assistance with compromised sites rarely belong on Stack Overflow and generally should go to the sister site security.stackexchange instead.

243 questions
3
votes
2 answers

Most efficient Anti-Crack methods

Since cracking is a huge problem I want to go deep into blocking those pirates (I don't even want to mention Cydia Themes, I have recorded a cracking percentage of over 98% on my themes which are all under 1$!!). There are several methods on how to…
JonasG
  • 9,274
  • 12
  • 59
  • 88
3
votes
2 answers

what is the difference between "python -c 'print' " and "(python -c 'print'; cat)" in linux

I usually use "python -c" to pass arguments to C program. Like this: $ python -c 'print "a" * 12' | ./program but when I execute a BOF practice program pwnable.kr/bof, the python -c 'print' and ( python -c 'print'; cat ) work differently. I…
won heo
  • 41
  • 4
3
votes
2 answers

Why is the "NOP-Block" and the Shellcode before the return Address?

In this example exploit the layout is [NOP-Block][Shellcode][Return Adress] But why cant I just overwrite the original return Address with the Adress to my Shellcode ? #include #include #include char shellcode[]=…
user9326786
3
votes
1 answer

How to crack SHA-256 whose preimage consists of multiple words?

I want to crack the preimage of a SHA-256 hash, it is an exercise and my only hint is: Concatenation of four visible words. I have tried to google the hash and put it into several online crackers / rainbow tables already. I think bruteforce is not…
3
votes
1 answer

Does this make Decompiling/Cracking harder?

I'm currently developing a commercial Java application, where I'm doing my best to protect it against cracking. I have couple of thoughts that I wish someone a bit more experienced in the field could help me clearing them. I'm protecting my software…
Lambasoft
  • 909
  • 2
  • 14
  • 33
3
votes
1 answer

Python Multiprocessing password cracker

I have been learning Python in my spare time for a small amount of time now and I set myself a challenge to build a password cracker for a very specific task, it was to test how effective the security on my ADSL Router was (not very) - using…
Andy
  • 77
  • 2
  • 9
3
votes
1 answer

Where is the method call in the EXE file?

Introduction After watching this video from LIDNUG, about .NET code protection http://secureteam.net/lidnug_recording/Untitled.swf (especially from 46:30 to 57:30), I would to locate the call to a MessageBox.Show in an EXE I created. The only logic…
Victor Hurdugaci
  • 28,177
  • 5
  • 87
  • 103
3
votes
5 answers

Software tools to automatically decrypt a file, whose encryption algorithm (and/or encryption keys) isn't known?

I have an idea for encryption that I could program fairly easily to encrypt some local text file. Given that my approach is novel, and does not use any of the industry standard encryption techniques, would I be able to test the strength of my…
Andrew
  • 31
  • 1
  • 3
3
votes
3 answers

Secure Software License Usage Audit Log

Folks, We have an intriguing technical challenge. How to write a secure audit file that tracks usage of a software so license fees can be based on usage thereby making it more affordable to those who use it less. Specifically, TickZoom sells a alpha…
Wayne
  • 2,959
  • 3
  • 30
  • 48
3
votes
2 answers

John the Ripper --rules option

I am trying to use John the Ripper with custom rules. I first added few extra rules in /etc/john/john.conf. For example - [List.Rules:CustomRule] cA0"[0-9][0-9]" A0"[0-9][0-9]" Next I tried to generate passwords using those rules but getting extra…
user2893731
  • 41
  • 1
  • 1
  • 3
3
votes
0 answers

John the ripper passwd file format with salt not working

I'm trying test password strength in one of ours ecommerce sites. Im using john the ripper to brute-force a password file. The algorihtm used by php is: $hash = md5($salt . $pass) No other transformation is performed nor in the $salt or in the…
user2253620
  • 53
  • 2
  • 5
3
votes
1 answer

Can apps keep secrets?

A given server API should be publicly accessible to all unauthorized users, but requests should only be allowed to originate from one specific app. This should, in theory, be accomplished by having the app HMAC-sign all API requests, and by having…
augustzf
  • 2,385
  • 1
  • 16
  • 22
3
votes
0 answers

Prevent detouring functions. Avoid cracking

There is an application that checks for activation using DLL Check function. Check returns 1 if application is activated and 0 otherwise. I create simple application and DLL containing function MyCheck (which always returns 1) with the same…
axe
  • 2,331
  • 4
  • 31
  • 53
3
votes
1 answer

Android App LVL protection cracked

my Android App obfuscated with Proguard and protected by Googles LVL has been cracked probably by a tool like Lucky Patcher removing the License check :-( Do you know of any better ways of implementing the Google License Check, possibly modifying…
le chiffre
  • 321
  • 1
  • 3
  • 14
2
votes
1 answer

Understanding/decoding obscure assembly code

Like my previous question, this involves an assignment where a method is called which requires a certain password, the code is hidden and we have to infer the password from the assembly code (I want to avoid hitting . I've completed a few phases so…
Gadesxion
  • 391
  • 2
  • 6
  • 18