SlideShare a Scribd company logo
1 of 28
 
An Overview of   Software Cracks
Percentage of pirated software in business
Cost of pirated software in million dollars
? What are cracks
Cracks are small programs designed to patch or modify other target programs.   Such modification usually involves illegally removing copyright information, removing the requirement to officially register the target program, or the conversion of a shareware/trial program with limited functionality into a fully functioning version. 
Time limit trials CD Protection Serial Keys Registration
 
Reverse Engineering
step-by-step execution of the program machine code into assembly language
Assembly Language is low-level machine language consisting of OPCODE Shows the position of the program bug by executing the program step-by-step Translates machine code into assembly language Allows to see the raw and exact contents of a file and manipulate binary files
Demo
 
Related Work
A  patch  is a small piece of software designed to update or fix problems with a program.  This includes fixing bugs replacing graphics and improving the usability or performance.
A  Hotfix  is a single cumulative package containing several encompassed bug fixes.  An encompassed bug fix is a software bug fix which is the not the main objective of the software patch, but rather the side-effect of it.
 
Applications
Game Trainers Game trainers are programs made to modify behaviour of a computer game, usually using addresses and values. It can "freeze" a memory address disallowing the game from lowering or changing the information stored at that memory address. It simply manipulates the data at the memory addresses specified to suit the needs of the person cheating at the game.
Malware Analysis Dynamic analysis -- we study a program as it executes. Here, tools of the trade are debuggers, function call tracers, machine emulators, logic analyzers, and network sniffers. Post-mortem analysis -- after effects of execution like logging, changes to file contents or to file access time patterns, data that was written to swap space, data that still lingers on in memory.
Heuristics Analysis The anti-virus program to decompiles the suspicious program, then analyzes the source code contained within. The source code of the suspicious file is compared to the source code of known viruses and virus-like activities. If a certain percentage of the source code matches with the code of known viruses or virus-like activities, the file is flagged, and the user alerted.
Safeguards
Code Obfuscation Obfuscated code is source code that is very hard to read and understand, often intentionally mainly for the purpose of deterring reverse engineering, reassembling, or recompiling. Another famous C example is: _ (__,___,____){___/__<=1?_(__,___+1,____):!(___%__)?_(__,___+1,0):___%__==___/ __&&!____?(printf(&quot;%d&quot;,___/__),_(__,___+1,0)):___%__>1&&___%__<___/__?_(__,1+ ___,____+!(___/__%(___%__))):___<__*__?_(__,___+1,____):0;}main(){_(100,0,0);} This program prints out the prime numbers less than 100.
void primes(int cap) { int i, j, composite; for(i = 2; i < cap; i++) { composite = 0; for(j = 2; j < i; j++)  composite += !(i % j); if(!composite) printf(&quot;%d&quot;, i); } } int main() {  primes(100);
Code Morphing Obfuscation by code morphing refers to obfuscating machine language or object code rather than obfuscating the source code. Completely replaces a section of the compiled code with an entirely new block that expects the same machine state when it begins execution as the previous section, and will leave with the same machine state after execution as the original. However, a number of additional operations will be completed as well as some operations with an equivalent effect.
Showtime
Bibliography: www.woodmann.com Hacker Disassembling Uncovered – ISBN 1931769222 www.en.wikipedia.com www.forums.megagames.com Video courtesy – www.youtube.com
Thank You Hrishikesh Choudhari Arnold Pereira

More Related Content

Viewers also liked

Bo Sc Flyer 2010
Bo Sc   Flyer 2010Bo Sc   Flyer 2010
Bo Sc Flyer 2010
boodie01
 
Economische kansen voor de regio Amsterdam, door Frank van Oort
Economische kansen voor de regio Amsterdam, door Frank van OortEconomische kansen voor de regio Amsterdam, door Frank van Oort
Economische kansen voor de regio Amsterdam, door Frank van Oort
AmsterdamseInnovatieMotor
 

Viewers also liked (13)

הורדת הפרסומת של שוקה - Buzzilla מחקר
  הורדת הפרסומת של שוקה - Buzzilla מחקר    הורדת הפרסומת של שוקה - Buzzilla מחקר
הורדת הפרסומת של שוקה - Buzzilla מחקר
 
Summary Bosc 2010
Summary Bosc 2010Summary Bosc 2010
Summary Bosc 2010
 
The Warhol Economy, door Elizabeth Currid
The Warhol Economy, door Elizabeth Currid The Warhol Economy, door Elizabeth Currid
The Warhol Economy, door Elizabeth Currid
 
Critical Reading And Critique
Critical Reading And CritiqueCritical Reading And Critique
Critical Reading And Critique
 
Functions
FunctionsFunctions
Functions
 
Hrishikesh Choudhari - Power Alarm
Hrishikesh Choudhari - Power AlarmHrishikesh Choudhari - Power Alarm
Hrishikesh Choudhari - Power Alarm
 
Bo Sc Flyer 2010
Bo Sc   Flyer 2010Bo Sc   Flyer 2010
Bo Sc Flyer 2010
 
Hrishikesh Choudhari India Presentation
Hrishikesh Choudhari India PresentationHrishikesh Choudhari India Presentation
Hrishikesh Choudhari India Presentation
 
Descriptive Essays
Descriptive EssaysDescriptive Essays
Descriptive Essays
 
Economische kansen voor de regio Amsterdam, door Frank van Oort
Economische kansen voor de regio Amsterdam, door Frank van OortEconomische kansen voor de regio Amsterdam, door Frank van Oort
Economische kansen voor de regio Amsterdam, door Frank van Oort
 
Toespraak burgemeester Cohen tijdens AIM09
Toespraak burgemeester Cohen tijdens AIM09Toespraak burgemeester Cohen tijdens AIM09
Toespraak burgemeester Cohen tijdens AIM09
 
Productieve Creativiteit, door Dany Jacobs
Productieve Creativiteit, door Dany JacobsProductieve Creativiteit, door Dany Jacobs
Productieve Creativiteit, door Dany Jacobs
 
Speech Robbert Dijkgraaf tijdens AIM09
Speech Robbert Dijkgraaf tijdens AIM09Speech Robbert Dijkgraaf tijdens AIM09
Speech Robbert Dijkgraaf tijdens AIM09
 

Similar to Hrishikesh Choudhari - Overview Of Cracks

1.7 selection and use of appropriate software
1.7 selection and use of appropriate software1.7 selection and use of appropriate software
1.7 selection and use of appropriate software
mrmwood
 

Similar to Hrishikesh Choudhari - Overview Of Cracks (20)

Computer system
Computer systemComputer system
Computer system
 
1.7 selection and use of appropriate software
1.7 selection and use of appropriate software1.7 selection and use of appropriate software
1.7 selection and use of appropriate software
 
Reverse engineering – debugging fundamentals
Reverse engineering – debugging fundamentalsReverse engineering – debugging fundamentals
Reverse engineering – debugging fundamentals
 
Kinds of Computer software
Kinds of  Computer softwareKinds of  Computer software
Kinds of Computer software
 
Introduction to system programming
Introduction to system programmingIntroduction to system programming
Introduction to system programming
 
test
testtest
test
 
test
testtest
test
 
UNIT 3.1 INTRODUCTON TO IDA.ppt
UNIT 3.1 INTRODUCTON TO IDA.pptUNIT 3.1 INTRODUCTON TO IDA.ppt
UNIT 3.1 INTRODUCTON TO IDA.ppt
 
A Bug Tracking System Is A Software Application
A Bug Tracking System Is A Software ApplicationA Bug Tracking System Is A Software Application
A Bug Tracking System Is A Software Application
 
IRJET- Obfuscation: Maze of Code
IRJET- Obfuscation: Maze of CodeIRJET- Obfuscation: Maze of Code
IRJET- Obfuscation: Maze of Code
 
Computer
ComputerComputer
Computer
 
Programming vs Coding: Unveiling The Key Differences
Programming vs Coding: Unveiling The Key DifferencesProgramming vs Coding: Unveiling The Key Differences
Programming vs Coding: Unveiling The Key Differences
 
PROBLEM SOLVING
PROBLEM SOLVINGPROBLEM SOLVING
PROBLEM SOLVING
 
Software tools
Software toolsSoftware tools
Software tools
 
computer Unit 6
computer Unit 6computer Unit 6
computer Unit 6
 
10 lesson8
10 lesson810 lesson8
10 lesson8
 
SWE-401 - 9. Software Implementation
SWE-401 - 9. Software ImplementationSWE-401 - 9. Software Implementation
SWE-401 - 9. Software Implementation
 
9. Software Implementation
9. Software Implementation9. Software Implementation
9. Software Implementation
 
grade 10 2023.pptx
grade 10 2023.pptxgrade 10 2023.pptx
grade 10 2023.pptx
 
Chapter 3 Software.ppt
Chapter 3 Software.pptChapter 3 Software.ppt
Chapter 3 Software.ppt
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 

Hrishikesh Choudhari - Overview Of Cracks

  • 1.  
  • 2. An Overview of Software Cracks
  • 3. Percentage of pirated software in business
  • 4. Cost of pirated software in million dollars
  • 5. ? What are cracks
  • 6. Cracks are small programs designed to patch or modify other target programs.  Such modification usually involves illegally removing copyright information, removing the requirement to officially register the target program, or the conversion of a shareware/trial program with limited functionality into a fully functioning version. 
  • 7. Time limit trials CD Protection Serial Keys Registration
  • 8.  
  • 10. step-by-step execution of the program machine code into assembly language
  • 11. Assembly Language is low-level machine language consisting of OPCODE Shows the position of the program bug by executing the program step-by-step Translates machine code into assembly language Allows to see the raw and exact contents of a file and manipulate binary files
  • 12. Demo
  • 13.  
  • 15. A patch is a small piece of software designed to update or fix problems with a program. This includes fixing bugs replacing graphics and improving the usability or performance.
  • 16. A Hotfix is a single cumulative package containing several encompassed bug fixes. An encompassed bug fix is a software bug fix which is the not the main objective of the software patch, but rather the side-effect of it.
  • 17.  
  • 19. Game Trainers Game trainers are programs made to modify behaviour of a computer game, usually using addresses and values. It can &quot;freeze&quot; a memory address disallowing the game from lowering or changing the information stored at that memory address. It simply manipulates the data at the memory addresses specified to suit the needs of the person cheating at the game.
  • 20. Malware Analysis Dynamic analysis -- we study a program as it executes. Here, tools of the trade are debuggers, function call tracers, machine emulators, logic analyzers, and network sniffers. Post-mortem analysis -- after effects of execution like logging, changes to file contents or to file access time patterns, data that was written to swap space, data that still lingers on in memory.
  • 21. Heuristics Analysis The anti-virus program to decompiles the suspicious program, then analyzes the source code contained within. The source code of the suspicious file is compared to the source code of known viruses and virus-like activities. If a certain percentage of the source code matches with the code of known viruses or virus-like activities, the file is flagged, and the user alerted.
  • 23. Code Obfuscation Obfuscated code is source code that is very hard to read and understand, often intentionally mainly for the purpose of deterring reverse engineering, reassembling, or recompiling. Another famous C example is: _ (__,___,____){___/__<=1?_(__,___+1,____):!(___%__)?_(__,___+1,0):___%__==___/ __&&!____?(printf(&quot;%d&quot;,___/__),_(__,___+1,0)):___%__>1&&___%__<___/__?_(__,1+ ___,____+!(___/__%(___%__))):___<__*__?_(__,___+1,____):0;}main(){_(100,0,0);} This program prints out the prime numbers less than 100.
  • 24. void primes(int cap) { int i, j, composite; for(i = 2; i < cap; i++) { composite = 0; for(j = 2; j < i; j++) composite += !(i % j); if(!composite) printf(&quot;%d&quot;, i); } } int main() { primes(100);
  • 25. Code Morphing Obfuscation by code morphing refers to obfuscating machine language or object code rather than obfuscating the source code. Completely replaces a section of the compiled code with an entirely new block that expects the same machine state when it begins execution as the previous section, and will leave with the same machine state after execution as the original. However, a number of additional operations will be completed as well as some operations with an equivalent effect.
  • 27. Bibliography: www.woodmann.com Hacker Disassembling Uncovered – ISBN 1931769222 www.en.wikipedia.com www.forums.megagames.com Video courtesy – www.youtube.com
  • 28. Thank You Hrishikesh Choudhari Arnold Pereira