• How to crack the code?

    The information provided below is provided solely for the purpose of enlightenment, as well as for perceiving defensive methods against hacking. It is not recommended to apply this knowledge to hacker attacks.

    This guide is intended to open programs on .Net in order to assist programmers in creating the best mechanisms to protect their development.

    The principle of .Net programs

    .Net programming languages ​​are: C #, Visual Basic, F #, Delphi.Net. The software code, written in these languages, is compiled into MSIL or IL (Intermediate Language), which is a stack mechanism without registers. The process of working in it looks like this:

    1. The stack includes a function with a certain number of variables;
    2. The function is executed;
    3. The output is the result.

    In .Net programs, metadata are distributed, that is, the information is stored in an executable file. The exact opposite of the HTML code is the hypertext markup language, which only tells the computer where and in what form the information should be on a web page, which is not programming.

    All the methods discussed below are performed using the .Net Reflector program decompiler. As an example, the Expresso application platform is used, which performs the task of a constant value analyzer.

    Extend the life of the program

    The method implies that a line is searched for in the program text where the initial start date is stored, which is either changed or erased. Then again, a certain time, you can use the software.

    1. To accomplish this, go to the Main Form designer and find the key reference in ExpressoKey.
    2. Next you need to open the registry editor for the link where the keys are located. By removing them, you can extend the life of the program.

    Here is a tip for developers: it is possible to write data to a “hidden place”. The main thing is that the user has them.

    How to make software licensed

    In order to hack and license the program, you need:

    1. Go to the reflector and find a place in the text responsible for the License or Registration.
    2. Enter the name and code for which the hash is calculated, and compare them.
    3. Now you need to open the IDE and fill in the required piece in the code through copying or by adding. At the same time, you need to decide on the parameters Prefix, Suffix and variables of the MyDES implementation. This all relates to technical issues.

    The key can be generated with any name.In this case, the protection is in asymmetric encryption, that is, you need to know the private key, without which you can not get the code.

    License validation

    Software developers usually view the license once, and then simply apply the checkbox: yes or no.

    To get around this point in two ways:

    1. Cheat the program with a fake license check;
    2. Prove the software that the license is valid.

    To do this, the program is searched for a place to check the license. Then a new project is created. At the same time, Reference is added to Expresso.exe and is passed through itself. If it turns out that the author of the software has changed public properties to private ones, then you should use a reflector for access, and then reduce everything to the above procedure. To protect against such hacks, it is required from time to time to check the license, view the program launch environment and exclude the installation of a new variable.

    Physical hacking software

    Physical hacking means decompiling the entire program into MSIL and then collecting it back. In this case, you need to use the SDK utility called ildasm and the compiler from the .Net Framework ilasm. The procedure is as follows:

    1. Loading ildasm;
    2. Run Expresso.exe and save the dump to il. file;
    3. The IsRegistered method is found and the code changes (without tags);
    4. With the help of ilasm everything is going back.

    This procedure allows an attacker to steal a program. And to defend oneself, one needs to obfuscate or enter part of the protection check into the native code.

    So the software author should think carefully about protecting his project, how much time and resources to spend on it, or it may be easier to write a free limited version. Only the creator of the software can decide, because any experienced hacker is able to crack the code.


    Related news


    How to change the cable
    How to make a wish come true in 1 day
    How to install a faucet in the bathroom
    Test: Guess the country in three cities
    What is a reflex
    How to multiply clematis
    How to configure Remote Assistance
    How to fry anything, while not soiling the stove with oil