can some one give ans pls
- Hot
- Active
-
Forum Thread: When My Kali Linux Finishes Installing (It Is Ready to Boot), and When I Try to Boot It All I Get Is a Black Screen. 8 Replies
3 days ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 12 Replies
1 wk ago -
Forum Thread: Hydra Syntax Issue Stops After 16 Attempts 2 Replies
1 mo ago -
Forum Thread: Hack Instagram Account Using BruteForce 208 Replies
1 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
2 mo ago -
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 22 Replies
2 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
3 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 21 Replies
3 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
3 mo ago -
How to: Crack Instagram Passwords Using Instainsane 36 Replies
3 mo ago -
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 5 Replies
3 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
3 mo ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 55 Replies
4 mo ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 10 Replies
4 mo ago -
Forum Thread: How to Run and Install Kali Linux on a Chromebook 18 Replies
5 mo ago -
Forum Thread: How to Find Admin Panel Page of a Website? 13 Replies
6 mo ago -
Forum Thread: can i run kali lenux in windows 10 without reboting my computer 4 Replies
6 mo ago -
Forum Thread: How to Hack School Website 11 Replies
6 mo ago -
Forum Thread: Make a Phishing Page for Harvesting Credentials Yourself 8 Replies
6 mo ago -
Forum Thread: Creating an Completely Undetectable Executable in Under 15 Minutes! 38 Replies
8 mo ago
-
How To: Hack Apache Tomcat via Malicious WAR File Upload
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
-
How To: Dox Anyone
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How To: Find Passwords in Exposed Log Files with Google Dorks
-
How To: Find Vulnerable Webcams Across the Globe Using Shodan
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
How To: Create a Persistent Back Door in Android Using Kali Linux:
-
Hacking Windows 10: How to Dump NTLM Hashes & Crack Windows Passwords
-
Hacking macOS: How to Hack a Mac Password Without Changing It
-
How To: Use Command Injection to Pop a Reverse Shell on a Web Server
-
How To: Beat LFI Restrictions with Advanced Techniques
-
How To: Use SpiderFoot for OSINT Gathering
-
How To: Hack Networks & Devices Right from Your Wrist with the Wi-Fi Deauther Watch
-
Hack Like a Pro: How to Find Any Router's Web Interface Using Shodan
-
How To: Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)
-
How to Hack Wi-Fi: Creating an Evil Twin Wireless Access Point to Eavesdrop on Data
-
How To: Embed a Metasploit Payload in an Original .Apk File | Part 2 – Do It Manually
3 Responses
First of all: If you would have read the forum rules, you'd know that posts require a minimum amount of english skills. What you've written is totally undecryptable.
But let me make an educated guess: You want to know the reasons why people are reverse engineering code, right?
There are the threes "F"'s of every motive behind every crime except for violent crimes:
Fortune
Fame
Fun
Some people grab the code and sell it on the black market to make money. They either sell the program for a cheaper prize than the developers or they sell the source code to other companies
Some people want to get internet cred, they write cracks or reverse engineer programs to become famous on the net. Those people mostly distribute the code for free.
Other people just do it for the heck of it. They enjoy what they're doing and test areas just don't provide enough of a challenge. Those people mostly don't share their result with anyone, because they don't want to harm the developers of the software.
Then there's always that kind of person that we all here want to become or already are, White-Hats, who break into software / code legally. It's their job, because if they crack it, the developers can protect their code better and other, malicious elements won't have it as easy.
Hope this answer is not completely off your question.
Decrypting his encryption (using: GamingChatLanguage)
original post: can some one give ans pls
translated post: Can someone give an answer to my question "Can I know why reverse engineering code is interesting for some people"?
Moving forward,
what I think is cool about code breaking/reverse engineering is that you get to break programs and make it do things it wasn't intended to do. Then report to the app's developer. In my opinion, I feel like a good person finding loopholes and letting the developer know, and help fix it. Before another person comes and exploits it for their own benefit.
In addition to this, it's time saving. Why write your own malware from scratch when you can modify pre-existing malware to fit your needs.
Share Your Thoughts