SlideShare a Scribd company logo
 
An Overview of   Software Cracks
Percentage of pirated software in business
Cost of pirated software in million dollars
? What are cracks
Cracks are small programs designed to patch or modify other target programs.   Such modification usually involves illegally removing copyright information, removing the requirement to officially register the target program, or the conversion of a shareware/trial program with limited functionality into a fully functioning version. 
Time limit trials CD Protection Serial Keys Registration
 
Reverse Engineering
step-by-step execution of the program machine code into assembly language
Assembly Language is low-level machine language consisting of OPCODE Shows the position of the program bug by executing the program step-by-step Translates machine code into assembly language Allows to see the raw and exact contents of a file and manipulate binary files
Demo
 
Related Work
A  patch  is a small piece of software designed to update or fix problems with a program.  This includes fixing bugs replacing graphics and improving the usability or performance.
A  Hotfix  is a single cumulative package containing several encompassed bug fixes.  An encompassed bug fix is a software bug fix which is the not the main objective of the software patch, but rather the side-effect of it.
 
Applications
Game Trainers Game trainers are programs made to modify behaviour of a computer game, usually using addresses and values. It can "freeze" a memory address disallowing the game from lowering or changing the information stored at that memory address. It simply manipulates the data at the memory addresses specified to suit the needs of the person cheating at the game.
Malware Analysis Dynamic analysis -- we study a program as it executes. Here, tools of the trade are debuggers, function call tracers, machine emulators, logic analyzers, and network sniffers. Post-mortem analysis -- after effects of execution like logging, changes to file contents or to file access time patterns, data that was written to swap space, data that still lingers on in memory.
Heuristics Analysis The anti-virus program to decompiles the suspicious program, then analyzes the source code contained within. The source code of the suspicious file is compared to the source code of known viruses and virus-like activities. If a certain percentage of the source code matches with the code of known viruses or virus-like activities, the file is flagged, and the user alerted.
Safeguards
Code Obfuscation Obfuscated code is source code that is very hard to read and understand, often intentionally mainly for the purpose of deterring reverse engineering, reassembling, or recompiling. Another famous C example is: _ (__,___,____){___/__<=1?_(__,___+1,____):!(___%__)?_(__,___+1,0):___%__==___/ __&&!____?(printf(&quot;%d&quot;,___/__),_(__,___+1,0)):___%__>1&&___%__<___/__?_(__,1+ ___,____+!(___/__%(___%__))):___<__*__?_(__,___+1,____):0;}main(){_(100,0,0);} This program prints out the prime numbers less than 100.
void primes(int cap) { int i, j, composite; for(i = 2; i < cap; i++) { composite = 0; for(j = 2; j < i; j++)  composite += !(i % j); if(!composite) printf(&quot;%d&quot;, i); } } int main() {  primes(100);
Code Morphing Obfuscation by code morphing refers to obfuscating machine language or object code rather than obfuscating the source code. Completely replaces a section of the compiled code with an entirely new block that expects the same machine state when it begins execution as the previous section, and will leave with the same machine state after execution as the original. However, a number of additional operations will be completed as well as some operations with an equivalent effect.
Showtime
Bibliography: www.woodmann.com Hacker Disassembling Uncovered – ISBN 1931769222 www.en.wikipedia.com www.forums.megagames.com Video courtesy – www.youtube.com
Thank You Hrishikesh Choudhari Arnold Pereira

More Related Content

Viewers also liked

הורדת הפרסומת של שוקה - Buzzilla מחקר
  הורדת הפרסומת של שוקה - Buzzilla מחקר    הורדת הפרסומת של שוקה - Buzzilla מחקר
הורדת הפרסומת של שוקה - Buzzilla מחקר
Buzzilla
 
Summary Bosc 2010
Summary Bosc 2010Summary Bosc 2010
Summary Bosc 2010
boodie01
 
The Warhol Economy, door Elizabeth Currid
The Warhol Economy, door Elizabeth Currid The Warhol Economy, door Elizabeth Currid
The Warhol Economy, door Elizabeth Currid
AmsterdamseInnovatieMotor
 
Critical Reading And Critique
Critical Reading And CritiqueCritical Reading And Critique
Critical Reading And Critique
Hrishikesh Choudhari
 
Functions
FunctionsFunctions
Hrishikesh Choudhari - Power Alarm
Hrishikesh Choudhari - Power AlarmHrishikesh Choudhari - Power Alarm
Hrishikesh Choudhari - Power Alarm
Hrishikesh Choudhari
 
Bo Sc Flyer 2010
Bo Sc   Flyer 2010Bo Sc   Flyer 2010
Bo Sc Flyer 2010boodie01
 
Hrishikesh Choudhari India Presentation
Hrishikesh Choudhari India PresentationHrishikesh Choudhari India Presentation
Hrishikesh Choudhari India Presentation
Hrishikesh Choudhari
 
Descriptive Essays
Descriptive EssaysDescriptive Essays
Descriptive Essays
Hrishikesh Choudhari
 
Economische kansen voor de regio Amsterdam, door Frank van Oort
Economische kansen voor de regio Amsterdam, door Frank van OortEconomische kansen voor de regio Amsterdam, door Frank van Oort
Economische kansen voor de regio Amsterdam, door Frank van Oort
AmsterdamseInnovatieMotor
 
Toespraak burgemeester Cohen tijdens AIM09
Toespraak burgemeester Cohen tijdens AIM09Toespraak burgemeester Cohen tijdens AIM09
Toespraak burgemeester Cohen tijdens AIM09
AmsterdamseInnovatieMotor
 
Productieve Creativiteit, door Dany Jacobs
Productieve Creativiteit, door Dany JacobsProductieve Creativiteit, door Dany Jacobs
Productieve Creativiteit, door Dany Jacobs
AmsterdamseInnovatieMotor
 
Speech Robbert Dijkgraaf tijdens AIM09
Speech Robbert Dijkgraaf tijdens AIM09Speech Robbert Dijkgraaf tijdens AIM09
Speech Robbert Dijkgraaf tijdens AIM09
AmsterdamseInnovatieMotor
 

Viewers also liked (13)

הורדת הפרסומת של שוקה - Buzzilla מחקר
  הורדת הפרסומת של שוקה - Buzzilla מחקר    הורדת הפרסומת של שוקה - Buzzilla מחקר
הורדת הפרסומת של שוקה - Buzzilla מחקר
 
Summary Bosc 2010
Summary Bosc 2010Summary Bosc 2010
Summary Bosc 2010
 
The Warhol Economy, door Elizabeth Currid
The Warhol Economy, door Elizabeth Currid The Warhol Economy, door Elizabeth Currid
The Warhol Economy, door Elizabeth Currid
 
Critical Reading And Critique
Critical Reading And CritiqueCritical Reading And Critique
Critical Reading And Critique
 
Functions
FunctionsFunctions
Functions
 
Hrishikesh Choudhari - Power Alarm
Hrishikesh Choudhari - Power AlarmHrishikesh Choudhari - Power Alarm
Hrishikesh Choudhari - Power Alarm
 
Bo Sc Flyer 2010
Bo Sc   Flyer 2010Bo Sc   Flyer 2010
Bo Sc Flyer 2010
 
Hrishikesh Choudhari India Presentation
Hrishikesh Choudhari India PresentationHrishikesh Choudhari India Presentation
Hrishikesh Choudhari India Presentation
 
Descriptive Essays
Descriptive EssaysDescriptive Essays
Descriptive Essays
 
Economische kansen voor de regio Amsterdam, door Frank van Oort
Economische kansen voor de regio Amsterdam, door Frank van OortEconomische kansen voor de regio Amsterdam, door Frank van Oort
Economische kansen voor de regio Amsterdam, door Frank van Oort
 
Toespraak burgemeester Cohen tijdens AIM09
Toespraak burgemeester Cohen tijdens AIM09Toespraak burgemeester Cohen tijdens AIM09
Toespraak burgemeester Cohen tijdens AIM09
 
Productieve Creativiteit, door Dany Jacobs
Productieve Creativiteit, door Dany JacobsProductieve Creativiteit, door Dany Jacobs
Productieve Creativiteit, door Dany Jacobs
 
Speech Robbert Dijkgraaf tijdens AIM09
Speech Robbert Dijkgraaf tijdens AIM09Speech Robbert Dijkgraaf tijdens AIM09
Speech Robbert Dijkgraaf tijdens AIM09
 

Similar to Hrishikesh Choudhari - Overview Of Cracks

Computer system
Computer systemComputer system
Computer system
RajThakuri
 
1.7 selection and use of appropriate software
1.7 selection and use of appropriate software1.7 selection and use of appropriate software
1.7 selection and use of appropriate software
mrmwood
 
Reverse engineering – debugging fundamentals
Reverse engineering – debugging fundamentalsReverse engineering – debugging fundamentals
Reverse engineering – debugging fundamentals
Eran Goldstein
 
Kinds of Computer software
Kinds of  Computer softwareKinds of  Computer software
Kinds of Computer software
Myra Juan
 
Introduction to system programming
Introduction to system programmingIntroduction to system programming
Introduction to system programming
sonalikharade3
 
test
testtest
test
testtest
UNIT 3.1 INTRODUCTON TO IDA.ppt
UNIT 3.1 INTRODUCTON TO IDA.pptUNIT 3.1 INTRODUCTON TO IDA.ppt
UNIT 3.1 INTRODUCTON TO IDA.ppt
ManjuAppukuttan2
 
A Bug Tracking System Is A Software Application
A Bug Tracking System Is A Software ApplicationA Bug Tracking System Is A Software Application
A Bug Tracking System Is A Software Application
Abhishek Pasricha
 
IRJET- Obfuscation: Maze of Code
IRJET- Obfuscation: Maze of CodeIRJET- Obfuscation: Maze of Code
IRJET- Obfuscation: Maze of Code
IRJET Journal
 
Computer
ComputerComputer
Programming vs Coding: Unveiling The Key Differences
Programming vs Coding: Unveiling The Key DifferencesProgramming vs Coding: Unveiling The Key Differences
Programming vs Coding: Unveiling The Key Differences
FredReynolds2
 
PROBLEM SOLVING
PROBLEM SOLVINGPROBLEM SOLVING
PROBLEM SOLVING
shahzadebaujiti
 
Software tools
Software toolsSoftware tools
Software tools
ravindravekariya
 
computer Unit 6
computer Unit 6computer Unit 6
computer Unit 6
Aqeel Rehman
 
10 lesson8
10 lesson810 lesson8
10 lesson8
Mary Grace Uminga
 
9. Software Implementation
9. Software Implementation9. Software Implementation
9. Software Implementation
ghayour abbas
 
SWE-401 - 9. Software Implementation
SWE-401 - 9. Software ImplementationSWE-401 - 9. Software Implementation
SWE-401 - 9. Software Implementation
ghayour abbas
 
grade 10 2023.pptx
grade 10 2023.pptxgrade 10 2023.pptx
grade 10 2023.pptx
RaymartHerera
 
Chapter 3 Software.ppt
Chapter 3 Software.pptChapter 3 Software.ppt
Chapter 3 Software.ppt
AmanuelZewdie4
 

Similar to Hrishikesh Choudhari - Overview Of Cracks (20)

Computer system
Computer systemComputer system
Computer system
 
1.7 selection and use of appropriate software
1.7 selection and use of appropriate software1.7 selection and use of appropriate software
1.7 selection and use of appropriate software
 
Reverse engineering – debugging fundamentals
Reverse engineering – debugging fundamentalsReverse engineering – debugging fundamentals
Reverse engineering – debugging fundamentals
 
Kinds of Computer software
Kinds of  Computer softwareKinds of  Computer software
Kinds of Computer software
 
Introduction to system programming
Introduction to system programmingIntroduction to system programming
Introduction to system programming
 
test
testtest
test
 
test
testtest
test
 
UNIT 3.1 INTRODUCTON TO IDA.ppt
UNIT 3.1 INTRODUCTON TO IDA.pptUNIT 3.1 INTRODUCTON TO IDA.ppt
UNIT 3.1 INTRODUCTON TO IDA.ppt
 
A Bug Tracking System Is A Software Application
A Bug Tracking System Is A Software ApplicationA Bug Tracking System Is A Software Application
A Bug Tracking System Is A Software Application
 
IRJET- Obfuscation: Maze of Code
IRJET- Obfuscation: Maze of CodeIRJET- Obfuscation: Maze of Code
IRJET- Obfuscation: Maze of Code
 
Computer
ComputerComputer
Computer
 
Programming vs Coding: Unveiling The Key Differences
Programming vs Coding: Unveiling The Key DifferencesProgramming vs Coding: Unveiling The Key Differences
Programming vs Coding: Unveiling The Key Differences
 
PROBLEM SOLVING
PROBLEM SOLVINGPROBLEM SOLVING
PROBLEM SOLVING
 
Software tools
Software toolsSoftware tools
Software tools
 
computer Unit 6
computer Unit 6computer Unit 6
computer Unit 6
 
10 lesson8
10 lesson810 lesson8
10 lesson8
 
9. Software Implementation
9. Software Implementation9. Software Implementation
9. Software Implementation
 
SWE-401 - 9. Software Implementation
SWE-401 - 9. Software ImplementationSWE-401 - 9. Software Implementation
SWE-401 - 9. Software Implementation
 
grade 10 2023.pptx
grade 10 2023.pptxgrade 10 2023.pptx
grade 10 2023.pptx
 
Chapter 3 Software.ppt
Chapter 3 Software.pptChapter 3 Software.ppt
Chapter 3 Software.ppt
 

Recently uploaded

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 

Recently uploaded (20)

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 

Hrishikesh Choudhari - Overview Of Cracks

  • 1.  
  • 2. An Overview of Software Cracks
  • 3. Percentage of pirated software in business
  • 4. Cost of pirated software in million dollars
  • 5. ? What are cracks
  • 6. Cracks are small programs designed to patch or modify other target programs.  Such modification usually involves illegally removing copyright information, removing the requirement to officially register the target program, or the conversion of a shareware/trial program with limited functionality into a fully functioning version. 
  • 7. Time limit trials CD Protection Serial Keys Registration
  • 8.  
  • 10. step-by-step execution of the program machine code into assembly language
  • 11. Assembly Language is low-level machine language consisting of OPCODE Shows the position of the program bug by executing the program step-by-step Translates machine code into assembly language Allows to see the raw and exact contents of a file and manipulate binary files
  • 12. Demo
  • 13.  
  • 15. A patch is a small piece of software designed to update or fix problems with a program. This includes fixing bugs replacing graphics and improving the usability or performance.
  • 16. A Hotfix is a single cumulative package containing several encompassed bug fixes. An encompassed bug fix is a software bug fix which is the not the main objective of the software patch, but rather the side-effect of it.
  • 17.  
  • 19. Game Trainers Game trainers are programs made to modify behaviour of a computer game, usually using addresses and values. It can &quot;freeze&quot; a memory address disallowing the game from lowering or changing the information stored at that memory address. It simply manipulates the data at the memory addresses specified to suit the needs of the person cheating at the game.
  • 20. Malware Analysis Dynamic analysis -- we study a program as it executes. Here, tools of the trade are debuggers, function call tracers, machine emulators, logic analyzers, and network sniffers. Post-mortem analysis -- after effects of execution like logging, changes to file contents or to file access time patterns, data that was written to swap space, data that still lingers on in memory.
  • 21. Heuristics Analysis The anti-virus program to decompiles the suspicious program, then analyzes the source code contained within. The source code of the suspicious file is compared to the source code of known viruses and virus-like activities. If a certain percentage of the source code matches with the code of known viruses or virus-like activities, the file is flagged, and the user alerted.
  • 23. Code Obfuscation Obfuscated code is source code that is very hard to read and understand, often intentionally mainly for the purpose of deterring reverse engineering, reassembling, or recompiling. Another famous C example is: _ (__,___,____){___/__<=1?_(__,___+1,____):!(___%__)?_(__,___+1,0):___%__==___/ __&&!____?(printf(&quot;%d&quot;,___/__),_(__,___+1,0)):___%__>1&&___%__<___/__?_(__,1+ ___,____+!(___/__%(___%__))):___<__*__?_(__,___+1,____):0;}main(){_(100,0,0);} This program prints out the prime numbers less than 100.
  • 24. void primes(int cap) { int i, j, composite; for(i = 2; i < cap; i++) { composite = 0; for(j = 2; j < i; j++) composite += !(i % j); if(!composite) printf(&quot;%d&quot;, i); } } int main() { primes(100);
  • 25. Code Morphing Obfuscation by code morphing refers to obfuscating machine language or object code rather than obfuscating the source code. Completely replaces a section of the compiled code with an entirely new block that expects the same machine state when it begins execution as the previous section, and will leave with the same machine state after execution as the original. However, a number of additional operations will be completed as well as some operations with an equivalent effect.
  • 27. Bibliography: www.woodmann.com Hacker Disassembling Uncovered – ISBN 1931769222 www.en.wikipedia.com www.forums.megagames.com Video courtesy – www.youtube.com
  • 28. Thank You Hrishikesh Choudhari Arnold Pereira