How do plugins and software get cracked?

Discussion in 'Lounge' started by birdboi, Dec 5, 2021.

  1. birdboi

    birdboi Producer

    Joined:
    Oct 20, 2021
    Messages:
    150
    Likes Received:
    99
    Im just a little curious, but how do scene groups actually crack a software?

    I know the first step is getting the legit version of the crack first and the installer, and what happens after that? Is there usually like a step by step process to doing it?

    Also how do keygens work?
     
    • Interesting Interesting x 1
    • List
  2.  
  3. naitguy

    naitguy Audiosexual

    Joined:
    Jan 9, 2017
    Messages:
    789
    Likes Received:
    558
    Location:
    Canada
    I've never done it, but it would involve reverse engineering code.

    Machine code is in binary form, which of course we can't understand for shit. So you have to convert that binary code back to a higher level, readable language somehow, then poke around and figure out how it's doing things like checking for a license, or valid login, etc..

    You can possibly decompile the code into a high level language if you know what the code was written in, or you can disassemble whether you do or not. That would let you see the code as assembly language. It's been like 30 years since I've coded in Assembly language.. but let me tell you, it sure isn't fun. But thankfully with more simpler written applications, you might be able to use techniques like this nice video describes here:



    I could re-explain this video in my own words, but it's probably best you just watch it. I am a programmer, by trade, but as I said, I've never actually cracked code, so I can't verify this is actually how this stuff is done, but it makes sense to me that it is. This was a pretty neat, informative video for me. I'd always kinda wondered too how some of this works, and the explanation makes sense.. although I'm sure it gets to be a much more difficult task the larger the program, and if they start doing things like encrypting strings you can't find them easily, finding timebombs, phoning home, and other fun hidden surprises... So ya, obviously some software is going to be a lot harder and/or more time consuming to crack.

    The video also directs you to some freeware software designed for people messing around to crack and build keygens. By that, I mean, it's a list of some .exe files that YOU are supposed to crack/build keygens for using. Pretty cool stuff.
     
    Last edited: Dec 5, 2021
    • Interesting Interesting x 3
    • Useful Useful x 3
    • List
  4. stopped

    stopped Platinum Record

    Joined:
    Mar 22, 2016
    Messages:
    538
    Likes Received:
    196
    • Winner Winner x 1
    • Interesting Interesting x 1
    • List
  5. demberto

    demberto Rock Star

    Joined:
    Nov 27, 2018
    Messages:
    933
    Likes Received:
    328
    Reverser finds out how serial key is verified inside the app for a given input and then implement this logic in his own keygen.
     
  6. No Doz

    No Doz Producer

    Joined:
    May 15, 2021
    Messages:
    119
    Likes Received:
    115
    nice try officer, better luck next time :dont:
     
    • Funny Funny x 8
    • Agree Agree x 2
    • Useful Useful x 1
    • List
  7. mk_96

    mk_96 Audiosexual

    Joined:
    Dec 31, 2020
    Messages:
    1,095
    Likes Received:
    764
    Location:
    Your heart
    not today, CIA
     
    • Funny Funny x 4
    • Agree Agree x 2
    • Interesting Interesting x 1
    • List
  8. recycle

    recycle Guest

    The one and only trick to crack anything is:

    Username: admin
    Pass: 1234
     
    • Winner Winner x 7
    • Funny Funny x 5
    • Like Like x 1
    • List
  9. Voekit

    Voekit Producer

    Joined:
    Mar 29, 2020
    Messages:
    150
    Likes Received:
    75
    Try learn about Reverse Engineering.
     
  10. DoubleTake

    DoubleTake Audiosexual

    Joined:
    Jul 16, 2017
    Messages:
    2,277
    Likes Received:
    1,227
    First you have to make your brain really smart.
    Then once your brain is really smart, ...
    Well, i don't know ... but once your brain is really smart it becomes obvious.
     
    • Funny Funny x 15
    • Agree Agree x 1
    • Winner Winner x 1
    • List
  11. Jelly

    Jelly Ultrasonic

    Joined:
    Jan 12, 2021
    Messages:
    52
    Likes Received:
    30
    Not too hard, just open the plugin in text file, find all ilok, timebomb, encryption and pace words and hit backspace
     
  12. Stevie Dude

    Stevie Dude Audiosexual

    Joined:
    Dec 29, 2020
    Messages:
    2,421
    Likes Received:
    2,185
    Location:
    Near Nyquist
    Reverse Engineering the cymbal sample and place it right before impact like a champ everyday.
     
  13. uhub

    uhub Kapellmeister

    Joined:
    Dec 9, 2016
    Messages:
    181
    Likes Received:
    70
    This is not place for any curious person other than Musicians/Music Curious :yes:

    By your question, i know you can't ever crack a ware not even an account :rofl:

    Just like Bin/Ccn/Cvv (52975xx323 Putout Edacra USA) :bleh:

    IP:Port: 192.168.0.1:8080 :guru:

    To open you need OllyDbg :wink:
     
  14. Lois Lane

    Lois Lane Audiosexual

    Joined:
    Jan 16, 2019
    Messages:
    4,767
    Likes Received:
    4,692
    Location:
    Somewhere Over The Rainbow
    Vasoline is cracked petroleum, David Bowie wrote a cool song called Cracked Actor, when your pants ride real low on your hips and you bend over someone might see yours, if you do like Devo and Whip It Good you might hear the snap of one, but don't ask me 'cause I have no clue, R2R starts the day to crack for me, to crack for you.





    [​IMG]




     
    Last edited: Dec 5, 2021
    • Like Like x 1
    • Funny Funny x 1
    • List
  15. ziked

    ziked Producer

    Joined:
    Nov 30, 2019
    Messages:
    114
    Likes Received:
    106
    I think the best way to explain to non-programmers is to compare with video game cheats.

    Super Mario 64 is hardcoded to start with only 4 lives. But if you can find where it stores that 4, you can change it to 99, and the game will always start with 99.

    That's pretty simple as it's just finding data to modify. How about something more complicated, such as modifying very specific code to change an outcome.

    In all the Pokemon games, the slot machines are rigged (just in real life). But by finding and modifying the code to skip the rigging part, we can make the odds much more in our favor.

    Then there's video game passwords, which gets more complicated. A long time ago, you got passwords you had to write down that saved your level or items. They didn't want you to be able to change it around to easily make your own passwords, so they intentionally make it more cryptic or elaborate. But the algorithm is still there in the code, hidden, waiting to be decoded. And that's how some people make "password generators" without actually modifying the game, allowing you to make any password you want. But to make these "password generators", you need a good understanding of what the code is doing, and need to correctly simulate what its doing in your own code, to be able to generate new passwords.

    Of course it gets more complicated when more sophisticated methods are used, but the ideas remain the same.
     
    Last edited: Dec 5, 2021
    • Like Like x 3
    • Interesting Interesting x 2
    • List
  16. birdboi

    birdboi Producer

    Joined:
    Oct 20, 2021
    Messages:
    150
    Likes Received:
    99
    I didnt say i wanted to crack one which i would be too lazy to do i wanted to know how it works lol
     
  17. BEAT16

    BEAT16 Audiosexual

    Joined:
    May 24, 2012
    Messages:
    9,081
    Likes Received:
    7,003
  18. Ŧยχøя

    Ŧยχøя Audiosexual

    Joined:
    Dec 15, 2020
    Messages:
    1,098
    Likes Received:
    765
    Location:
    Neverland
    Easy, they push:
    [​IMG] (and sometimes Start :yes:)

    Otherwise IDKFA or IDDQD is good for a last resort.. :mad:
     
    Last edited: Dec 5, 2021
  19. Deceptive

    Deceptive Audiosexual

    Joined:
    Feb 17, 2016
    Messages:
    969
    Likes Received:
    551
    This is the way how i do it , but i am not sure about other teams ...:bleh:
     
    Last edited: Dec 5, 2021
  20. realitybytez

    realitybytez Audiosexual

    Joined:
    May 29, 2013
    Messages:
    1,451
    Likes Received:
    633
    [​IMG]
     
    • Like Like x 1
    • Funny Funny x 1
    • Creative Creative x 1
    • List
  21. thedarkbird

    thedarkbird Platinum Record

    Joined:
    Oct 16, 2020
    Messages:
    115
    Likes Received:
    166
    Software is programmed in a programming language, like C++. This higher-level language is then translated by a compiler to a more basic language that can be interpreted by the computer (machine code). When the compiler does the translation the original program language (C++) is not in the final software executable, only the basic machine code, so it's quite unreadable by humans.

    Software is cracked in more or less 2 ways:
    1. By disassembling the whole software in a more user readable format (assembly language); this is never the original programming language which is why reverse engineering/cracking is not so easy
    2. By executing the software in a debugger and following its realtime execution (usually setting breakpoints on interesting functions/code since following the whole execution would be quite an infinite process)

    The two are often combined: looking at the disassembled code identifying possible interesting parts and then using a debugger to set breakpoints at those parts and investigate the realtime execution.

    In its most simple form, software sets and checks a flag to verify if it has been bought or not. To crack it there are usually 2 attack vectors:
    1. Patch the executable so that the registered-flag is always set
    2. Interpret the serial code algorithm so you can program a keygen to generate a valid code

    Again, many times both (and more) attack vectors are combined.

    Of course this is all simplified. In reality a well protected piece of software will use encryption, packing, code obfuscation, anti-debugger techniques, hash verification and a lot of more tricks to avoid being cracked. Often resulting in a cat-and-mouse game between developer and cracker.

    Yes, I used to be a cracker, long time ago :)
     
    Last edited: Dec 5, 2021
    • Like Like x 6
    • Interesting Interesting x 4
    • List
Loading...
Loading...