cracking

Python Multiprocessing password cracker

醉酒当歌 提交于 2020-03-26 23:21:21
问题 I have been learning Python in my spare time for a small amount of time now and I set myself a challenge to build a password cracker for a very specific task, it was to test how effective the security on my ADSL Router was (not very) - using Wireshark I could quite clearly see how it was hashing the password over http and I developed some code to perform a wordlist attack. (I apologise if you think my code is badly written - you would probably be correct!). #!/usr/bin/env python import

Modify a program I'm not the owner of

家住魔仙堡 提交于 2020-01-05 08:42:21
问题 For a website oriented on security, I have a challenge which consist in cracking an application. It's the first challenge of that category, and I must admit I have no experience at all in this (and sadly no documentation is linked in that challenge). So here I'm not asking for the answer, but more about a way to find it. The challenge : I connect using SSH to a machine, and get into this folder : binary1@challenge02:~$ ls -la total 24 dr-xr-x--x 2 binary1 binary1 4096 mai 4 2013 . dr-xr-xr-x

Modify a program I'm not the owner of

大兔子大兔子 提交于 2020-01-05 08:42:06
问题 For a website oriented on security, I have a challenge which consist in cracking an application. It's the first challenge of that category, and I must admit I have no experience at all in this (and sadly no documentation is linked in that challenge). So here I'm not asking for the answer, but more about a way to find it. The challenge : I connect using SSH to a machine, and get into this folder : binary1@challenge02:~$ ls -la total 24 dr-xr-x--x 2 binary1 binary1 4096 mai 4 2013 . dr-xr-xr-x

How do I copy-protect my Java application? [closed]

依然范特西╮ 提交于 2019-12-29 02:51:26
问题 Closed . This question needs to be more focused. It is not currently accepting answers. Want to improve this question? Update the question so it focuses on one problem only by editing this post. Closed 4 years ago . I want to sell my Java application using PayPal. When a payment is received, the customer is mailed a one-time download link to my application. My question is, how do I prevent people from sending the .jar file to their friends/uploading it on the internet? Obviously I need some

Password strength checkers that take into account Moore's Law? [closed]

烈酒焚心 提交于 2019-12-24 00:53:39
问题 As it currently stands, this question is not a good fit for our Q&A format. We expect answers to be supported by facts, references, or expertise, but this question will likely solicit debate, arguments, polling, or extended discussion. If you feel that this question can be improved and possibly reopened, visit the help center for guidance. Closed 6 years ago . I was going about doing my annual password change on my accounts and tried various sites (microsoft, lastpass, etc) to try out

Can i crack usb security dongle?

主宰稳场 提交于 2019-12-22 20:29:23
问题 I have to develop a plugin for a program that uses dongle to activate.Just wondering can i crack the key of the usb or something else? 回答1: I'm sure you can , but you might be running afoul of the various legislation regarding the act of reverse engineering content protection systems. I am, of course, referring to the American DCMA statues. In any event, as pure thought experiment, I might try the following: Clone the USB firmware image, and load it into a virtual USB port As you say, crack

Can i crack usb security dongle?

感情迁移 提交于 2019-12-22 20:28:58
问题 I have to develop a plugin for a program that uses dongle to activate.Just wondering can i crack the key of the usb or something else? 回答1: I'm sure you can , but you might be running afoul of the various legislation regarding the act of reverse engineering content protection systems. I am, of course, referring to the American DCMA statues. In any event, as pure thought experiment, I might try the following: Clone the USB firmware image, and load it into a virtual USB port As you say, crack

Changing the program flow when running under a debugger

杀马特。学长 韩版系。学妹 提交于 2019-12-18 19:04:43
问题 Is there any way of detecting that a debugger is running in memory? and here comes the on Form Load pseudocode. if debugger.IsRunning then Application.exit end if Edit: The original title was "Detecting an in memory debugger" 回答1: Try the following if ( System.Diagnostics.Debugger.IsAttached ) { ... } 回答2: Two things to keep in mind before using this to close an application running in the debugger: I've used a debugger to pull a crash trace from a commercial .NET application and send it to

Have you ever used code virtualizer or vmprotect to protect from reverse engineering?

只愿长相守 提交于 2019-12-18 11:09:43
问题 I know that there is no way to fully protect our code. I also know that if a user wants to crack our app, then he or she is not a user that would buy our app. I also know that it is better to improve our app.. instead of being afraid of anticracking techniques. I also know that there is no commercial tool that can protec our app.... I also know that.... Ok. Enough. I've heard everything. I really think that adding a little protection won't hurt. So.... have you ever used code virtulizer from

Have you ever used code virtualizer or vmprotect to protect from reverse engineering?

删除回忆录丶 提交于 2019-12-18 11:09:14
问题 I know that there is no way to fully protect our code. I also know that if a user wants to crack our app, then he or she is not a user that would buy our app. I also know that it is better to improve our app.. instead of being afraid of anticracking techniques. I also know that there is no commercial tool that can protec our app.... I also know that.... Ok. Enough. I've heard everything. I really think that adding a little protection won't hurt. So.... have you ever used code virtulizer from