I was reading a article on here about Ollydbg and program cracking. The article was published two years ago and so I wasn't sure if there are newer methods to go about doing this. How would you go about cracking a particle program?
Forum Thread: How Would You Go About Cracking a Program?
- Hot
- Active
-
Forum Thread: Is There Any Way to Port Forward Without a Router? 12 Replies
1 hr ago -
Forum Thread: When My Kali Linux Finishes Installing (It Is Ready to Boot), and When I Try to Boot It All I Get Is a Black Screen. 8 Replies
4 days ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 12 Replies
1 wk ago -
Forum Thread: Hydra Syntax Issue Stops After 16 Attempts 2 Replies
1 mo ago -
Forum Thread: Hack Instagram Account Using BruteForce 208 Replies
1 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
2 mo ago -
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 22 Replies
3 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
3 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 21 Replies
3 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
3 mo ago -
How to: Crack Instagram Passwords Using Instainsane 36 Replies
3 mo ago -
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 5 Replies
3 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
3 mo ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 55 Replies
4 mo ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 10 Replies
4 mo ago -
Forum Thread: How to Run and Install Kali Linux on a Chromebook 18 Replies
5 mo ago -
Forum Thread: How to Find Admin Panel Page of a Website? 13 Replies
6 mo ago -
Forum Thread: can i run kali lenux in windows 10 without reboting my computer 4 Replies
6 mo ago -
Forum Thread: How to Hack School Website 11 Replies
6 mo ago -
Forum Thread: Make a Phishing Page for Harvesting Credentials Yourself 8 Replies
6 mo ago
-
How To: Crack Password-Protected Microsoft Office Files, Including Word Docs & Excel Spreadsheets
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
How To: Brute-Force Nearly Any Website Login with Hatch
-
How To: Use SQL Injection to Run OS Commands & Get a Shell
-
How To: Create Custom Wordlists for Password Cracking Using the Mentalist
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
How To: Check if Your Wireless Network Adapter Supports Monitor Mode & Packet Injection
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
How To: Brute-Force FTP Credentials & Get Server Access
-
Tutorial: Create Wordlists with Crunch
-
How to Hack Wi-Fi: Get Anyone's Wi-Fi Password Without Cracking Using Wifiphisher
-
How To: Use SpiderFoot for OSINT Gathering
-
How To: Scan Websites for Interesting Directories & Files with Gobuster
-
How To: Exploit Shellshock on a Web Server Using Metasploit
-
How To: Scan, Fake & Attack Wi-Fi Networks with the ESP8266-Based WiFi Deauther
-
How To: Hack WiFi Using a WPS Pixie Dust Attack
-
How To: Use & Abuse the Address Resolution Protocol (ARP) to Locate Hosts on a Network
-
How To: Brute-Force WPA/WPA2 via GPU
-
How To: Dox Anyone
3 Responses
This is called "reverse engineering". It's a very big topic, but for some basic concepts you can start reading my article about IDA Pro and Hopper here on Null Byte.
Also wait for advices from people with more knowledge than me (EDIT: they came, scroll down the page!).
EDIT: I've just seen the article you are talking about. As you can see, a requirement is the software IDA, which I explain the mechanics in my post.
EDIT: you can find it here:https://null-byte.wonderhowto.com/how-to/binary-patching-brute-force-reverse-engineering-with-ida-and-hopper-and-hex-editor-0157194/
That's a pretty generic question with a lot of ways to answer it, mostly because it depends on the type of program you're wanting to reverse engineer (crack).
For example, to RE newer .NET apps require tools like .NET Reflector; older programs coded in more traditional languages like C++/Delphi for example you can use regular debuggers like OllyDbg (I used to use SoftICE but it's dead now), Classic VB (VB5/6, etc.) had tools like SmartCheck, Android apps have their own set of tools and so on. IDA is often useful in most of the types in one way or another to see the disassembled listing of the code.
It's a long road of learning and rolling up your sleeves and just digging in and watching as things happen in the program while you play with making your own changes in it and seeing how it affects the app. The tools are the most important thing to making life easier for you along the way, of which there are MANY.
Excellent and thoughtful response, Stardogg.
Welcome to Null Byte.
Share Your Thoughts