How do plugins and software get cracked?

Discussion in 'Lounge' started by birdboi, Dec 5, 2021.

  1. birdboi

    birdboi Producer

    Joined:
    Oct 20, 2021
    Messages:
    130
    Likes Received:
    84
    Im just a little curious, but how do scene groups actually crack a software?

    I know the first step is getting the legit version of the crack first and the installer, and what happens after that? Is there usually like a step by step process to doing it?

    Also how do keygens work?
     
    • Interesting Interesting x 1
    • List
  2.  
  3. naitguy

    naitguy Platinum Record

    Joined:
    Jan 9, 2017
    Messages:
    413
    Likes Received:
    283
    Location:
    Canada
    I've never done it, but it would involve reverse engineering code.

    Machine code is in binary form, which of course we can't understand for shit. So you have to convert that binary code back to a higher level, readable language somehow, then poke around and figure out how it's doing things like checking for a license, or valid login, etc..

    You can possibly decompile the code into a high level language if you know what the code was written in, or you can disassemble whether you do or not. That would let you see the code as assembly language. It's been like 30 years since I've coded in Assembly language.. but let me tell you, it sure isn't fun. But thankfully with more simpler written applications, you might be able to use techniques like this nice video describes here:



    I could re-explain this video in my own words, but it's probably best you just watch it. I am a programmer, by trade, but as I said, I've never actually cracked code, so I can't verify this is actually how this stuff is done, but it makes sense to me that it is. This was a pretty neat, informative video for me. I'd always kinda wondered too how some of this works, and the explanation makes sense.. although I'm sure it gets to be a much more difficult task the larger the program, and if they start doing things like encrypting strings you can't find them easily, finding timebombs, phoning home, and other fun hidden surprises... So ya, obviously some software is going to be a lot harder and/or more time consuming to crack.

    The video also directs you to some freeware software designed for people messing around to crack and build keygens. By that, I mean, it's a list of some .exe files that YOU are supposed to crack/build keygens for using. Pretty cool stuff.
     
    Last edited: Dec 5, 2021
    • Interesting Interesting x 3
    • Useful Useful x 3
    • List
  4. stopped

    stopped Ultrasonic

    Joined:
    Mar 22, 2016
    Messages:
    117
    Likes Received:
    36
    • Winner Winner x 1
    • Interesting Interesting x 1
    • List
  5. demberto

    demberto Platinum Record

    Joined:
    Nov 27, 2018
    Messages:
    843
    Likes Received:
    279
    Reverser finds out how serial key is verified inside the app for a given input and then implement this logic in his own keygen.
     
  6. No Doz

    No Doz Producer

    Joined:
    May 15, 2021
    Messages:
    90
    Likes Received:
    85
    nice try officer, better luck next time :dont:
     
    • Funny Funny x 8
    • Agree Agree x 2
    • Useful Useful x 1
    • List
  7. mk_96

    mk_96 Platinum Record

    Joined:
    Dec 31, 2020
    Messages:
    304
    Likes Received:
    201
    not today, CIA
     
    • Funny Funny x 4
    • Agree Agree x 2
    • Interesting Interesting x 1
    • List
  8. recycle

    recycle Audiosexual

    Joined:
    Nov 13, 2013
    Messages:
    1,643
    Likes Received:
    1,129
    Location:
    motherboard
    The one and only trick to crack anything is:

    Username: admin
    Pass: 1234
     
    • Winner Winner x 7
    • Funny Funny x 5
    • Like Like x 1
    • List
  9. Voekit

    Voekit Producer

    Joined:
    Mar 29, 2020
    Messages:
    153
    Likes Received:
    76
    Try learn about Reverse Engineering.
     
  10. DoubleTake

    DoubleTake Audiosexual

    Joined:
    Jul 16, 2017
    Messages:
    1,588
    Likes Received:
    834
    First you have to make your brain really smart.
    Then once your brain is really smart, ...
    Well, i don't know ... but once your brain is really smart it becomes obvious.
     
    • Funny Funny x 15
    • Agree Agree x 1
    • Winner Winner x 1
    • List
  11. Jelly

    Jelly Member

    Joined:
    Jan 12, 2021
    Messages:
    18
    Likes Received:
    13
    Not too hard, just open the plugin in text file, find all ilok, timebomb, encryption and pace words and hit backspace
     
  12. Stevie Dude

    Stevie Dude Audiosexual

    Joined:
    Dec 29, 2020
    Messages:
    998
    Likes Received:
    704
    Location:
    Near Nyquist
    Reverse Engineering the cymbal sample and place it right before impact like a champ everyday.
     
  13. uhub

    uhub Kapellmeister

    Joined:
    Dec 9, 2016
    Messages:
    164
    Likes Received:
    58
    This is not place for any curious person other than Musicians/Music Curious :yes:

    By your question, i know you can't ever crack a ware not even an account :rofl:

    Just like Bin/Ccn/Cvv (52975xx323 Putout Edacra USA) :bleh:

    IP:Port: 192.168.0.1:8080 :guru:

    To open you need OllyDbg :wink:
     
  14. Lois Lane

    Lois Lane Audiosexual

    Joined:
    Jan 16, 2019
    Messages:
    2,715
    Likes Received:
    2,852
    Location:
    Someplace Over The Rainbow
    Vasoline is cracked petroleum, David Bowie wrote a cool song called Cracked Actor, when your pants ride real low on your hips and you bend over someone might see yours, if you do like Devo and Whip It Good you might hear the snap of one, but don't ask me 'cause I have no clue, R2R starts the day to crack for me, to crack for you.





    [​IMG]




     
    Last edited: Dec 5, 2021
    • Like Like x 1
    • Funny Funny x 1
    • List
  15. ziked

    ziked Ultrasonic

    Joined:
    Nov 30, 2019
    Messages:
    32
    Likes Received:
    29
    I think the best way to explain to non-programmers is to compare with video game cheats.

    Super Mario 64 is hardcoded to start with only 4 lives. But if you can find where it stores that 4, you can change it to 99, and the game will always start with 99.

    That's pretty simple as it's just finding data to modify. How about something more complicated, such as modifying very specific code to change an outcome.

    In all the Pokemon games, the slot machines are rigged (just in real life). But by finding and modifying the code to skip the rigging part, we can make the odds much more in our favor.

    Then there's video game passwords, which gets more complicated. A long time ago, you got passwords you had to write down that saved your level or items. They didn't want you to be able to change it around to easily make your own passwords, so they intentionally make it more cryptic or elaborate. But the algorithm is still there in the code, hidden, waiting to be decoded. And that's how some people make "password generators" without actually modifying the game, allowing you to make any password you want. But to make these "password generators", you need a good understanding of what the code is doing, and need to correctly simulate what its doing in your own code, to be able to generate new passwords.

    Of course it gets more complicated when more sophisticated methods are used, but the ideas remain the same.
     
    Last edited: Dec 5, 2021
    • Like Like x 3
    • Interesting Interesting x 2
    • List
  16. birdboi

    birdboi Producer

    Joined:
    Oct 20, 2021
    Messages:
    130
    Likes Received:
    84
    I didnt say i wanted to crack one which i would be too lazy to do i wanted to know how it works lol
     
  17. BEAT16

    BEAT16 Audiosexual

    Joined:
    May 24, 2012
    Messages:
    6,922
    Likes Received:
    4,999
  18. Ŧยχøя

    Ŧยχøя Audiosexual

    Joined:
    Dec 15, 2020
    Messages:
    1,098
    Likes Received:
    758
    Location:
    Neverland
    Easy, they push:
    [​IMG] (and sometimes Start :yes:)

    Otherwise IDKFA or IDDQD is good for a last resort.. :mad:
     
    Last edited: Dec 5, 2021
  19. Deceptive

    Deceptive Audiosexual

    Joined:
    Feb 17, 2016
    Messages:
    969
    Likes Received:
    543
    This is the way how i do it , but i am not sure about other teams ...:bleh:
     
    Last edited: Dec 5, 2021
  20. realitybytez

    realitybytez Audiosexual

    Joined:
    May 29, 2013
    Messages:
    1,434
    Likes Received:
    618
    [​IMG]
     
    • Like Like x 1
    • Funny Funny x 1
    • Creative Creative x 1
    • List
  21. thedarkbird

    thedarkbird Producer

    Joined:
    Oct 16, 2020
    Messages:
    74
    Likes Received:
    103
    Software is programmed in a programming language, like C++. This higher-level language is then translated by a compiler to a more basic language that can be interpreted by the computer (machine code). When the compiler does the translation the original program language (C++) is not in the final software executable, only the basic machine code, so it's quite unreadable by humans.

    Software is cracked in more or less 2 ways:
    1. By disassembling the whole software in a more user readable format (assembly language); this is never the original programming language which is why reverse engineering/cracking is not so easy
    2. By executing the software in a debugger and following its realtime execution (usually setting breakpoints on interesting functions/code since following the whole execution would be quite an infinite process)

    The two are often combined: looking at the disassembled code identifying possible interesting parts and then using a debugger to set breakpoints at those parts and investigate the realtime execution.

    In its most simple form, software sets and checks a flag to verify if it has been bought or not. To crack it there are usually 2 attack vectors:
    1. Patch the executable so that the registered-flag is always set
    2. Interpret the serial code algorithm so you can program a keygen to generate a valid code

    Again, many times both (and more) attack vectors are combined.

    Of course this is all simplified. In reality a well protected piece of software will use encryption, packing, code obfuscation, anti-debugger techniques, hash verification and a lot of more tricks to avoid being cracked. Often resulting in a cat-and-mouse game between developer and cracker.

    Yes, I used to be a cracker, long time ago :)
     
    Last edited: Dec 5, 2021
    • Like Like x 6
    • Interesting Interesting x 4
    • List
Loading...
Loading...