SlideShare a Scribd company logo
1 of 28
 
An Overview of   Software Cracks
Percentage of pirated software in business
Cost of pirated software in million dollars
? What are cracks
Cracks are small programs designed to patch or modify other target programs.   Such modification usually involves illegally removing copyright information, removing the requirement to officially register the target program, or the conversion of a shareware/trial program with limited functionality into a fully functioning version. 
Time limit trials CD Protection Serial Keys Registration
 
Reverse Engineering
step-by-step execution of the program machine code into assembly language
Assembly Language is low-level machine language consisting of OPCODE Shows the position of the program bug by executing the program step-by-step Translates machine code into assembly language Allows to see the raw and exact contents of a file and manipulate binary files
Demo
 
Related Work
A  patch  is a small piece of software designed to update or fix problems with a program.  This includes fixing bugs replacing graphics and improving the usability or performance.
A  Hotfix  is a single cumulative package containing several encompassed bug fixes.  An encompassed bug fix is a software bug fix which is the not the main objective of the software patch, but rather the side-effect of it.
 
Applications
Game Trainers Game trainers are programs made to modify behaviour of a computer game, usually using addresses and values. It can "freeze" a memory address disallowing the game from lowering or changing the information stored at that memory address. It simply manipulates the data at the memory addresses specified to suit the needs of the person cheating at the game.
Malware Analysis Dynamic analysis -- we study a program as it executes. Here, tools of the trade are debuggers, function call tracers, machine emulators, logic analyzers, and network sniffers. Post-mortem analysis -- after effects of execution like logging, changes to file contents or to file access time patterns, data that was written to swap space, data that still lingers on in memory.
Heuristics Analysis The anti-virus program to decompiles the suspicious program, then analyzes the source code contained within. The source code of the suspicious file is compared to the source code of known viruses and virus-like activities. If a certain percentage of the source code matches with the code of known viruses or virus-like activities, the file is flagged, and the user alerted.
Safeguards
Code Obfuscation Obfuscated code is source code that is very hard to read and understand, often intentionally mainly for the purpose of deterring reverse engineering, reassembling, or recompiling. Another famous C example is: _ (__,___,____){___/__<=1?_(__,___+1,____):!(___%__)?_(__,___+1,0):___%__==___/ __&&!____?(printf(&quot;%d&quot;,___/__),_(__,___+1,0)):___%__>1&&___%__<___/__?_(__,1+ ___,____+!(___/__%(___%__))):___<__*__?_(__,___+1,____):0;}main(){_(100,0,0);} This program prints out the prime numbers less than 100.
void primes(int cap) { int i, j, composite; for(i = 2; i < cap; i++) { composite = 0; for(j = 2; j < i; j++)  composite += !(i % j); if(!composite) printf(&quot;%d&quot;, i); } } int main() {  primes(100);
Code Morphing Obfuscation by code morphing refers to obfuscating machine language or object code rather than obfuscating the source code. Completely replaces a section of the compiled code with an entirely new block that expects the same machine state when it begins execution as the previous section, and will leave with the same machine state after execution as the original. However, a number of additional operations will be completed as well as some operations with an equivalent effect.
Showtime
Bibliography: www.woodmann.com Hacker Disassembling Uncovered – ISBN 1931769222 www.en.wikipedia.com www.forums.megagames.com Video courtesy – www.youtube.com
Thank You Hrishikesh Choudhari Arnold Pereira

More Related Content

Viewers also liked

Bo Sc Flyer 2010
Bo Sc   Flyer 2010Bo Sc   Flyer 2010
Bo Sc Flyer 2010
boodie01
 
Economische kansen voor de regio Amsterdam, door Frank van Oort
Economische kansen voor de regio Amsterdam, door Frank van OortEconomische kansen voor de regio Amsterdam, door Frank van Oort
Economische kansen voor de regio Amsterdam, door Frank van Oort
AmsterdamseInnovatieMotor
 

Viewers also liked (13)

הורדת הפרסומת של שוקה - Buzzilla מחקר
  הורדת הפרסומת של שוקה - Buzzilla מחקר    הורדת הפרסומת של שוקה - Buzzilla מחקר
הורדת הפרסומת של שוקה - Buzzilla מחקר
 
Summary Bosc 2010
Summary Bosc 2010Summary Bosc 2010
Summary Bosc 2010
 
The Warhol Economy, door Elizabeth Currid
The Warhol Economy, door Elizabeth Currid The Warhol Economy, door Elizabeth Currid
The Warhol Economy, door Elizabeth Currid
 
Critical Reading And Critique
Critical Reading And CritiqueCritical Reading And Critique
Critical Reading And Critique
 
Functions
FunctionsFunctions
Functions
 
Hrishikesh Choudhari - Power Alarm
Hrishikesh Choudhari - Power AlarmHrishikesh Choudhari - Power Alarm
Hrishikesh Choudhari - Power Alarm
 
Bo Sc Flyer 2010
Bo Sc   Flyer 2010Bo Sc   Flyer 2010
Bo Sc Flyer 2010
 
Hrishikesh Choudhari India Presentation
Hrishikesh Choudhari India PresentationHrishikesh Choudhari India Presentation
Hrishikesh Choudhari India Presentation
 
Descriptive Essays
Descriptive EssaysDescriptive Essays
Descriptive Essays
 
Economische kansen voor de regio Amsterdam, door Frank van Oort
Economische kansen voor de regio Amsterdam, door Frank van OortEconomische kansen voor de regio Amsterdam, door Frank van Oort
Economische kansen voor de regio Amsterdam, door Frank van Oort
 
Toespraak burgemeester Cohen tijdens AIM09
Toespraak burgemeester Cohen tijdens AIM09Toespraak burgemeester Cohen tijdens AIM09
Toespraak burgemeester Cohen tijdens AIM09
 
Productieve Creativiteit, door Dany Jacobs
Productieve Creativiteit, door Dany JacobsProductieve Creativiteit, door Dany Jacobs
Productieve Creativiteit, door Dany Jacobs
 
Speech Robbert Dijkgraaf tijdens AIM09
Speech Robbert Dijkgraaf tijdens AIM09Speech Robbert Dijkgraaf tijdens AIM09
Speech Robbert Dijkgraaf tijdens AIM09
 

Similar to Hrishikesh Choudhari - Overview Of Cracks

1.7 selection and use of appropriate software
1.7 selection and use of appropriate software1.7 selection and use of appropriate software
1.7 selection and use of appropriate software
mrmwood
 

Similar to Hrishikesh Choudhari - Overview Of Cracks (20)

Computer system
Computer systemComputer system
Computer system
 
1.7 selection and use of appropriate software
1.7 selection and use of appropriate software1.7 selection and use of appropriate software
1.7 selection and use of appropriate software
 
Reverse engineering – debugging fundamentals
Reverse engineering – debugging fundamentalsReverse engineering – debugging fundamentals
Reverse engineering – debugging fundamentals
 
Kinds of Computer software
Kinds of  Computer softwareKinds of  Computer software
Kinds of Computer software
 
Introduction to system programming
Introduction to system programmingIntroduction to system programming
Introduction to system programming
 
test
testtest
test
 
test
testtest
test
 
UNIT 3.1 INTRODUCTON TO IDA.ppt
UNIT 3.1 INTRODUCTON TO IDA.pptUNIT 3.1 INTRODUCTON TO IDA.ppt
UNIT 3.1 INTRODUCTON TO IDA.ppt
 
A Bug Tracking System Is A Software Application
A Bug Tracking System Is A Software ApplicationA Bug Tracking System Is A Software Application
A Bug Tracking System Is A Software Application
 
IRJET- Obfuscation: Maze of Code
IRJET- Obfuscation: Maze of CodeIRJET- Obfuscation: Maze of Code
IRJET- Obfuscation: Maze of Code
 
Computer
ComputerComputer
Computer
 
Programming vs Coding: Unveiling The Key Differences
Programming vs Coding: Unveiling The Key DifferencesProgramming vs Coding: Unveiling The Key Differences
Programming vs Coding: Unveiling The Key Differences
 
PROBLEM SOLVING
PROBLEM SOLVINGPROBLEM SOLVING
PROBLEM SOLVING
 
Software tools
Software toolsSoftware tools
Software tools
 
computer Unit 6
computer Unit 6computer Unit 6
computer Unit 6
 
10 lesson8
10 lesson810 lesson8
10 lesson8
 
9. Software Implementation
9. Software Implementation9. Software Implementation
9. Software Implementation
 
SWE-401 - 9. Software Implementation
SWE-401 - 9. Software ImplementationSWE-401 - 9. Software Implementation
SWE-401 - 9. Software Implementation
 
grade 10 2023.pptx
grade 10 2023.pptxgrade 10 2023.pptx
grade 10 2023.pptx
 
Chapter 3 Software.ppt
Chapter 3 Software.pptChapter 3 Software.ppt
Chapter 3 Software.ppt
 

Recently uploaded

Recently uploaded (20)

Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 

Hrishikesh Choudhari - Overview Of Cracks

  • 1.  
  • 2. An Overview of Software Cracks
  • 3. Percentage of pirated software in business
  • 4. Cost of pirated software in million dollars
  • 5. ? What are cracks
  • 6. Cracks are small programs designed to patch or modify other target programs.  Such modification usually involves illegally removing copyright information, removing the requirement to officially register the target program, or the conversion of a shareware/trial program with limited functionality into a fully functioning version. 
  • 7. Time limit trials CD Protection Serial Keys Registration
  • 8.  
  • 10. step-by-step execution of the program machine code into assembly language
  • 11. Assembly Language is low-level machine language consisting of OPCODE Shows the position of the program bug by executing the program step-by-step Translates machine code into assembly language Allows to see the raw and exact contents of a file and manipulate binary files
  • 12. Demo
  • 13.  
  • 15. A patch is a small piece of software designed to update or fix problems with a program. This includes fixing bugs replacing graphics and improving the usability or performance.
  • 16. A Hotfix is a single cumulative package containing several encompassed bug fixes. An encompassed bug fix is a software bug fix which is the not the main objective of the software patch, but rather the side-effect of it.
  • 17.  
  • 19. Game Trainers Game trainers are programs made to modify behaviour of a computer game, usually using addresses and values. It can &quot;freeze&quot; a memory address disallowing the game from lowering or changing the information stored at that memory address. It simply manipulates the data at the memory addresses specified to suit the needs of the person cheating at the game.
  • 20. Malware Analysis Dynamic analysis -- we study a program as it executes. Here, tools of the trade are debuggers, function call tracers, machine emulators, logic analyzers, and network sniffers. Post-mortem analysis -- after effects of execution like logging, changes to file contents or to file access time patterns, data that was written to swap space, data that still lingers on in memory.
  • 21. Heuristics Analysis The anti-virus program to decompiles the suspicious program, then analyzes the source code contained within. The source code of the suspicious file is compared to the source code of known viruses and virus-like activities. If a certain percentage of the source code matches with the code of known viruses or virus-like activities, the file is flagged, and the user alerted.
  • 23. Code Obfuscation Obfuscated code is source code that is very hard to read and understand, often intentionally mainly for the purpose of deterring reverse engineering, reassembling, or recompiling. Another famous C example is: _ (__,___,____){___/__<=1?_(__,___+1,____):!(___%__)?_(__,___+1,0):___%__==___/ __&&!____?(printf(&quot;%d&quot;,___/__),_(__,___+1,0)):___%__>1&&___%__<___/__?_(__,1+ ___,____+!(___/__%(___%__))):___<__*__?_(__,___+1,____):0;}main(){_(100,0,0);} This program prints out the prime numbers less than 100.
  • 24. void primes(int cap) { int i, j, composite; for(i = 2; i < cap; i++) { composite = 0; for(j = 2; j < i; j++) composite += !(i % j); if(!composite) printf(&quot;%d&quot;, i); } } int main() { primes(100);
  • 25. Code Morphing Obfuscation by code morphing refers to obfuscating machine language or object code rather than obfuscating the source code. Completely replaces a section of the compiled code with an entirely new block that expects the same machine state when it begins execution as the previous section, and will leave with the same machine state after execution as the original. However, a number of additional operations will be completed as well as some operations with an equivalent effect.
  • 27. Bibliography: www.woodmann.com Hacker Disassembling Uncovered – ISBN 1931769222 www.en.wikipedia.com www.forums.megagames.com Video courtesy – www.youtube.com
  • 28. Thank You Hrishikesh Choudhari Arnold Pereira