All the Cracked Software that we use is at the mercy of Reverse engineering. The software is patched by bypassing the license key. And this is what we know as Cracked / modify / hacked / nulled etc.
RE- malware analysis is done, RE- is a very powerful tool, hackers can compromise any security system through it. Much more is done.
Photoshop, idm, filmora, Microsoft office, adobe etc. These have been cracked by Reverse Engineering.
And no one can do it, it's not as easy as lucky patcher to click and modify apk for android.
Your brain must be good for RE. You have to be able to understand the code. No one will let you swallow it easily.
Using your own brain will take the flame. You will probably get some clues. Some software has been cracked, you will get videos that do reverse engineering, etc. You will have to take your idea after watching all this.
★Does it benefit hackers?
Suppose someone cracked Photoshop day and night by doing Reverse engineering. Now why would he give it to you for free to use?
They Don't give ,,, they will give you for his own interest. Of course, many give for free. Because wants to be a celebrity, wants views, how much. Also gives free for publicity.
Many people will bind the Malware code inside again.Maybe it is Rensomware, Botnet, miner, rat etc. This could be your computer jack, or data theft!
(The funny thing is that you can remove the malware through Reverse Engineering by doing Malware Analysis again and make it virus free)
Botnet is the most binded of these. Because no one can easily understand without analysis. And botnet has many features. One of them is Ddos attack, password recovery etc.
I will tell you about that some other day.
★How To Do Reverse Engineering.
Reverse engineering is done in many way for many things, Android phone apps modify is done through RE. If you want to RE Android app, you need to be expart. After decompiling the code, RE and recompile it again. (You can do it with Apk Easy tool).
And there are some debugging tools for computer software, dbg32,64, ollydbg,hex tool,resource tuner etc.There are many tools for many tasks. With these, extract the source code of the software and study it. Try adding something new.
Antivirus detects the virus by reverse engineering. RE studies the virus, then creates a program on how to remove it.
★How To Crack Software?
Here is a small example:
Suppose you are going JHB From CAPE TOWN.
and you do not have a driving license. How to go then?
Of course you will run if you see the police, or you will avoid and go the other way.
So Going to JHB is the things.
Reverse engineering is also like that.
The license key of the software will be seen first. Then you have to jump to that place. It should be noted that the key is not being sought here.
Then you have to jump to that place. It should be noted that the key is not being sought here. But will not show you. Because you jumped. So even if you want it, you don't want it anymore. Then the matter of Reminder.
You will see that after a while the key wants, gives a reminder. For this you have to reverse engineering and remove the Reminder option.
When these code changes are made, it changes a lot from the original software. When it is installed on the Internet data then try to connect to the cracked file ta original repository. Only then did he realize that the coding had been averaged. And then it blocks the firewall. And antivirus detects the file as a virus.
And it is not possible to teach by writing Reverse Engineering, of course you have to learn through video. You have to learn using brain.
And of course, before giving Cracked file Download, do Malware analysis. Otherwise your favorite PC data will be stolen and you will not understand.
USB spread is enabled in current viruses.
If there is a virus in the PC, you can also get USB in it. Then that USB will slowly spread to other PCs. It will continue to spread from one device to another.
So refrain from using any USB. Congratulations if you are a Linux user.
You don't have to worry about these viruses. There is no problem even if you call thousands of usb. High security in linux. And those who make malware make it by targeting windows.
And they are bound in Cracked files and spread in various ways.
I just wrote the basics of hacking with reverse engineering. There is so much more to it.
0 Comments