SlideShare a Scribd company logo
 
An Overview of   Software Cracks
Percentage of pirated software in business
Cost of pirated software in million dollars
? What are cracks
Cracks are small programs designed to patch or modify other target programs.   Such modification usually involves illegally removing copyright information, removing the requirement to officially register the target program, or the conversion of a shareware/trial program with limited functionality into a fully functioning version. 
Time limit trials CD Protection Serial Keys Registration
 
Reverse Engineering
step-by-step execution of the program machine code into assembly language
Assembly Language is low-level machine language consisting of OPCODE Shows the position of the program bug by executing the program step-by-step Translates machine code into assembly language Allows to see the raw and exact contents of a file and manipulate binary files
Demo
 
Related Work
A  patch  is a small piece of software designed to update or fix problems with a program.  This includes fixing bugs replacing graphics and improving the usability or performance.
A  Hotfix  is a single cumulative package containing several encompassed bug fixes.  An encompassed bug fix is a software bug fix which is the not the main objective of the software patch, but rather the side-effect of it.
 
Applications
Game Trainers Game trainers are programs made to modify behaviour of a computer game, usually using addresses and values. It can "freeze" a memory address disallowing the game from lowering or changing the information stored at that memory address. It simply manipulates the data at the memory addresses specified to suit the needs of the person cheating at the game.
Malware Analysis Dynamic analysis -- we study a program as it executes. Here, tools of the trade are debuggers, function call tracers, machine emulators, logic analyzers, and network sniffers. Post-mortem analysis -- after effects of execution like logging, changes to file contents or to file access time patterns, data that was written to swap space, data that still lingers on in memory.
Heuristics Analysis The anti-virus program to decompiles the suspicious program, then analyzes the source code contained within. The source code of the suspicious file is compared to the source code of known viruses and virus-like activities. If a certain percentage of the source code matches with the code of known viruses or virus-like activities, the file is flagged, and the user alerted.
Safeguards
Code Obfuscation Obfuscated code is source code that is very hard to read and understand, often intentionally mainly for the purpose of deterring reverse engineering, reassembling, or recompiling. Another famous C example is: _ (__,___,____){___/__<=1?_(__,___+1,____):!(___%__)?_(__,___+1,0):___%__==___/ __&&!____?(printf(&quot;%d\t&quot;,___/__),_(__,___+1,0)):___%__>1&&___%__<___/__?_(__,1+ ___,____+!(___/__%(___%__))):___<__*__?_(__,___+1,____):0;}main(){_(100,0,0);} This program prints out the prime numbers less than 100.
void primes(int cap) { int i, j, composite; for(i = 2; i < cap; i++) { composite = 0; for(j = 2; j < i; j++)  composite += !(i % j); if(!composite) printf(&quot;%d\t&quot;, i); } } int main() {  primes(100);
Code Morphing Obfuscation by code morphing refers to obfuscating machine language or object code rather than obfuscating the source code. Completely replaces a section of the compiled code with an entirely new block that expects the same machine state when it begins execution as the previous section, and will leave with the same machine state after execution as the original. However, a number of additional operations will be completed as well as some operations with an equivalent effect.
Showtime
Bibliography: www.woodmann.com Hacker Disassembling Uncovered – ISBN 1931769222 www.en.wikipedia.com www.forums.megagames.com Video courtesy – www.youtube.com
Thank You Hrishikesh Choudhari Arnold Pereira

More Related Content

PPT
Lecture 2 - Introductory Concepts
PPT
Lecture 5 - Structured Programming Language
PPT
Lecture 22 - Error Handling
PDF
הורדת הפרסומת של שוקה - Buzzilla מחקר
PPT
Ronde Tafels 2010 Inkoop
PDF
הורדת הפרסומת של שוקה- Buzzilla מחקר
PDF
מחקר מתנות Pdf.040411
Lecture 2 - Introductory Concepts
Lecture 5 - Structured Programming Language
Lecture 22 - Error Handling
הורדת הפרסומת של שוקה - Buzzilla מחקר
Ronde Tafels 2010 Inkoop
הורדת הפרסומת של שוקה- Buzzilla מחקר
מחקר מתנות Pdf.040411

Viewers also liked (13)

PDF
הורדת הפרסומת של שוקה - Buzzilla מחקר
PDF
Summary Bosc 2010
PPT
The Warhol Economy, door Elizabeth Currid
PPT
Critical Reading And Critique
PPT
PPTX
Hrishikesh Choudhari - Power Alarm
PPT
Bo Sc Flyer 2010
PPTX
Hrishikesh Choudhari India Presentation
PPT
Descriptive Essays
PPT
Economische kansen voor de regio Amsterdam, door Frank van Oort
DOC
Toespraak burgemeester Cohen tijdens AIM09
PPT
Productieve Creativiteit, door Dany Jacobs
PDF
Speech Robbert Dijkgraaf tijdens AIM09
הורדת הפרסומת של שוקה - Buzzilla מחקר
Summary Bosc 2010
The Warhol Economy, door Elizabeth Currid
Critical Reading And Critique
Hrishikesh Choudhari - Power Alarm
Bo Sc Flyer 2010
Hrishikesh Choudhari India Presentation
Descriptive Essays
Economische kansen voor de regio Amsterdam, door Frank van Oort
Toespraak burgemeester Cohen tijdens AIM09
Productieve Creativiteit, door Dany Jacobs
Speech Robbert Dijkgraaf tijdens AIM09
Ad

Similar to Hrishikesh Choudhari - Overview Of Cracks (20)

PPTX
Computer system
PPTX
1.7 selection and use of appropriate software
PDF
Reverse engineering – debugging fundamentals
PPTX
Kinds of Computer software
PPTX
Introduction to system programming
PPT
UNIT 3.1 INTRODUCTON TO IDA.ppt
PPTX
A Bug Tracking System Is A Software Application
PDF
IRJET- Obfuscation: Maze of Code
PDF
Programming vs Coding: Unveiling The Key Differences
DOCX
PROBLEM SOLVING
PPTX
Programming C ppt for learning foundations
PPT
Software tools
PDF
computer Unit 6
PPTX
10 lesson8
PDF
SWE-401 - 9. Software Implementation
PDF
9. Software Implementation
PPTX
Embedded System on design web development.pptx
Computer system
1.7 selection and use of appropriate software
Reverse engineering – debugging fundamentals
Kinds of Computer software
Introduction to system programming
UNIT 3.1 INTRODUCTON TO IDA.ppt
A Bug Tracking System Is A Software Application
IRJET- Obfuscation: Maze of Code
Programming vs Coding: Unveiling The Key Differences
PROBLEM SOLVING
Programming C ppt for learning foundations
Software tools
computer Unit 6
10 lesson8
SWE-401 - 9. Software Implementation
9. Software Implementation
Embedded System on design web development.pptx
Ad

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
Teaching material agriculture food technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Machine learning based COVID-19 study performance prediction
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Encapsulation theory and applications.pdf
Unlocking AI with Model Context Protocol (MCP)
Programs and apps: productivity, graphics, security and other tools
Digital-Transformation-Roadmap-for-Companies.pptx
sap open course for s4hana steps from ECC to s4
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
cuic standard and advanced reporting.pdf
Network Security Unit 5.pdf for BCA BBA.
Teaching material agriculture food technology
Chapter 3 Spatial Domain Image Processing.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
MIND Revenue Release Quarter 2 2025 Press Release
Machine learning based COVID-19 study performance prediction
Diabetes mellitus diagnosis method based random forest with bat algorithm
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Spectral efficient network and resource selection model in 5G networks
Encapsulation theory and applications.pdf

Hrishikesh Choudhari - Overview Of Cracks

  • 1.  
  • 2. An Overview of Software Cracks
  • 3. Percentage of pirated software in business
  • 4. Cost of pirated software in million dollars
  • 5. ? What are cracks
  • 6. Cracks are small programs designed to patch or modify other target programs.  Such modification usually involves illegally removing copyright information, removing the requirement to officially register the target program, or the conversion of a shareware/trial program with limited functionality into a fully functioning version. 
  • 7. Time limit trials CD Protection Serial Keys Registration
  • 8.  
  • 10. step-by-step execution of the program machine code into assembly language
  • 11. Assembly Language is low-level machine language consisting of OPCODE Shows the position of the program bug by executing the program step-by-step Translates machine code into assembly language Allows to see the raw and exact contents of a file and manipulate binary files
  • 12. Demo
  • 13.  
  • 15. A patch is a small piece of software designed to update or fix problems with a program. This includes fixing bugs replacing graphics and improving the usability or performance.
  • 16. A Hotfix is a single cumulative package containing several encompassed bug fixes. An encompassed bug fix is a software bug fix which is the not the main objective of the software patch, but rather the side-effect of it.
  • 17.  
  • 19. Game Trainers Game trainers are programs made to modify behaviour of a computer game, usually using addresses and values. It can &quot;freeze&quot; a memory address disallowing the game from lowering or changing the information stored at that memory address. It simply manipulates the data at the memory addresses specified to suit the needs of the person cheating at the game.
  • 20. Malware Analysis Dynamic analysis -- we study a program as it executes. Here, tools of the trade are debuggers, function call tracers, machine emulators, logic analyzers, and network sniffers. Post-mortem analysis -- after effects of execution like logging, changes to file contents or to file access time patterns, data that was written to swap space, data that still lingers on in memory.
  • 21. Heuristics Analysis The anti-virus program to decompiles the suspicious program, then analyzes the source code contained within. The source code of the suspicious file is compared to the source code of known viruses and virus-like activities. If a certain percentage of the source code matches with the code of known viruses or virus-like activities, the file is flagged, and the user alerted.
  • 23. Code Obfuscation Obfuscated code is source code that is very hard to read and understand, often intentionally mainly for the purpose of deterring reverse engineering, reassembling, or recompiling. Another famous C example is: _ (__,___,____){___/__<=1?_(__,___+1,____):!(___%__)?_(__,___+1,0):___%__==___/ __&&!____?(printf(&quot;%d\t&quot;,___/__),_(__,___+1,0)):___%__>1&&___%__<___/__?_(__,1+ ___,____+!(___/__%(___%__))):___<__*__?_(__,___+1,____):0;}main(){_(100,0,0);} This program prints out the prime numbers less than 100.
  • 24. void primes(int cap) { int i, j, composite; for(i = 2; i < cap; i++) { composite = 0; for(j = 2; j < i; j++) composite += !(i % j); if(!composite) printf(&quot;%d\t&quot;, i); } } int main() { primes(100);
  • 25. Code Morphing Obfuscation by code morphing refers to obfuscating machine language or object code rather than obfuscating the source code. Completely replaces a section of the compiled code with an entirely new block that expects the same machine state when it begins execution as the previous section, and will leave with the same machine state after execution as the original. However, a number of additional operations will be completed as well as some operations with an equivalent effect.
  • 27. Bibliography: www.woodmann.com Hacker Disassembling Uncovered – ISBN 1931769222 www.en.wikipedia.com www.forums.megagames.com Video courtesy – www.youtube.com
  • 28. Thank You Hrishikesh Choudhari Arnold Pereira