Questions tagged [cracking]

Activities to break into computer(s) or technology systems without authorized access.

Questions requesting assistance with compromised sites rarely belong on Stack Overflow and generally should go to the sister site security.stackexchange instead.

243 questions
46
votes
3 answers

Decompiling Objective-C libraries

I've just finished a library in Objective-C that I compiled as a Static Library for distribution. I'd wanted to know what chances to get this decompiled are out there. Do you know any software that can do this? If so, how could I protect me…
Cy.
  • 2,125
  • 4
  • 26
  • 35
30
votes
6 answers

How do I copy-protect my Java application?

I want to sell my Java application using PayPal. When a payment is received, the customer is mailed a one-time download link to my application. My question is, how do I prevent people from sending the .jar file to their friends/uploading it on the…
cragiz
  • 453
  • 2
  • 5
  • 8
30
votes
8 answers

how are serial generators / cracks developed?

I mean, I always was wondered about how the hell somebody can develop algorithms to break/cheat the constraints of legal use in many shareware programs out there. Just for curiosity.
Alex. S.
  • 143,260
  • 19
  • 55
  • 62
23
votes
8 answers

My website got hacked.. What should I do?

My dad called me today and said people going to his website were getting 168 viruses trying to download to their computers. He isn't technical at all, and built the whole thing with a WYSIWYG editor. I popped his site open and viewed the source, and…
cmcculloh
  • 47,596
  • 40
  • 105
  • 130
18
votes
6 answers

How to protect .Net exe from Decompiling/Cracking

I am really sad because a few days ago we launched our software developed in .Net 4.0 (Desktop application). After 3 days, its crack was available on the internet. We tried to protect the software from this but somehow people got away cracking it.…
Behroz Sikander
  • 3,885
  • 3
  • 22
  • 36
16
votes
3 answers

Have you ever used code virtualizer or vmprotect to protect from reverse engineering?

I know that there is no way to fully protect our code. I also know that if a user wants to crack our app, then he or she is not a user that would buy our app. I also know that it is better to improve our app.. instead of being afraid of anticracking…
Jag
16
votes
2 answers

Changing the program flow when running under a debugger

Is there any way of detecting that a debugger is running in memory? and here comes the on Form Load pseudocode. if debugger.IsRunning then Application.exit end if Edit: The original title was "Detecting an in memory debugger"
OrElse
  • 9,709
  • 39
  • 140
  • 253
15
votes
6 answers

How to make a good anti-crack protection?

I will start off with saying I know that it is impossible to prevent your software from reverse engineering. But, when I take a look at crackmes.de, there are crackmes with a difficulty grade of 8 and 9 (on a scale of 1 to 10). These crackmes are…
Martijn Courteaux
  • 67,591
  • 47
  • 198
  • 287
13
votes
2 answers

How to detect a cracked iPhone App and a jailbroken device (different methods)

I'm building a blacklisting service for cracked iPhone apps and I am curious if I missed a method for detecting cracked apps. In the moment following app crack detection methods are available for the service: checking plist size checking signer…
Robse
  • 131
  • 1
  • 1
  • 3
13
votes
5 answers

About how fast can you brute force PBKDF2?

After the linkedin password hash leak, I've been looking at our password hashing. We using Django 1.4 which uses PBKDF2, which is great and a step up from the previous SHA1. However I'm curious how easily one could brute force that. I'm looking at…
Amandasaurus
  • 58,203
  • 71
  • 188
  • 248
12
votes
4 answers

How to skip a line doing a buffer overflow in C

I want to skip a line in C, the line x=1; in the main section using bufferoverflow; however, I don't know why I can not skip the address from 4002f4 to the next address 4002fb in spite of the fact that I am counting 7 bytes form to…
Percy
  • 121
  • 1
  • 4
11
votes
5 answers

How To Extract .flv Stream from JW Player 5.1?

The problem is I've a slow internet connection, and the video doesn't buffer like in YouTube. Therefore I was wondering weather I can extract the url of the .flv file which is being streamed in JW Player and directly download it. Doing some…
Catfish
  • 689
  • 1
  • 11
  • 24
9
votes
8 answers

Software protection / code obfuscation that does not trigger antivirus false positives

I'm looking for software protection and/or code obfuscation software like Oreans Themida, VSProtect, ASPRotect and similar. However, antivirus false positives is a deal-breaker for me. I cannot inconvenience or scare away our legitimate users. And…
haimg
  • 4,547
  • 35
  • 47
9
votes
9 answers

Hacking/cracking deontology

Let's say you recently discovered some major vulnerabilities in a couple of websites that activate mainly in your country and are very powerful in their market. The vulnerabilities I'm talking about are as worse as letting me browse the admin…
Ionuț G. Stan
  • 176,118
  • 18
  • 189
  • 202
9
votes
3 answers

Found codes left by hacker but don't understand what it does

I found a line of script left by the hacker in one of my PHP files. And it reads like this: Can anyone please give some hints about what this line of code does? Thank you
user2926814
  • 145
  • 6
1
2 3
16 17