cracking

Decompiling Objective-C libraries

一世执手 提交于 2019-12-17 03:51:09
问题 I've just finished a library in Objective-C that I compiled as a Static Library for distribution. I'd wanted to know what chances to get this decompiled are out there. Do you know any software that can do this? If so, how could I protect me better? EDIT: My static lib is made for iPhone / ARM I created an algorithm that depending on the some parameters of the app, it can run as demo or as full code. You init the object with X variables and unlock the full version. I was wondering if they'll

Decompiling Objective-C libraries

荒凉一梦 提交于 2019-12-17 03:51:06
问题 I've just finished a library in Objective-C that I compiled as a Static Library for distribution. I'd wanted to know what chances to get this decompiled are out there. Do you know any software that can do this? If so, how could I protect me better? EDIT: My static lib is made for iPhone / ARM I created an algorithm that depending on the some parameters of the app, it can run as demo or as full code. You init the object with X variables and unlock the full version. I was wondering if they'll

Can i break Adobe PDF password encryption with RC4/AES 128bits?

送分小仙女□ 提交于 2019-12-11 18:21:56
问题 I've encrypted some pdf files with iTextsharp lib and using AES 128bits and key length = 16bytes(protect reading).Can anyone break password or some app can do that? Thank so much. 回答1: You can set 2 kinds of possible "passwords" here: Read password Edit/Modify password Using an "edit password" is not secure at all, because it's possible to read the whole file (even without knowing the password, by using PdfReader.unethicalreading = true; ) and then creating a new unencrypted one: using System

About how fast can you brute force PBKDF2?

时光毁灭记忆、已成空白 提交于 2019-12-09 15:28:46
问题 After the linkedin password hash leak, I've been looking at our password hashing. We using Django 1.4 which uses PBKDF2, which is great and a step up from the previous SHA1. However I'm curious how easily one could brute force that. I'm looking at our password complexity rules, and am wondering how fast it'd take to do (say) 8 length lower case ascii letters. This guide to cracking the LinkedIn password hash, has someone doing 430 million sha1 hashes per second on a GPU. http://erratasec

Can i crack usb security dongle?

青春壹個敷衍的年華 提交于 2019-12-06 11:32:37
I have to develop a plugin for a program that uses dongle to activate.Just wondering can i crack the key of the usb or something else? I'm sure you can , but you might be running afoul of the various legislation regarding the act of reverse engineering content protection systems. I am, of course, referring to the American DCMA statues. In any event, as pure thought experiment, I might try the following: Clone the USB firmware image, and load it into a virtual USB port As you say, crack the key and the USB interface, and short-circuit the check in a virtual USB device. Locate the part of the

What is the Best way to create a program which works only in the predefined trial period(evaluation period)?

橙三吉。 提交于 2019-12-06 07:21:36
问题 I need to create a simple application that doesn't work after 30 days. How can I do that ? Is there a way to use Trial program after 30 days ? 回答1: There is always a way to use a trial program after 30 days. 回答2: If by "best" you mean least breakable, then there is really only one way: make it an Internet-based "software as a service" application. If you don't provide access, they're not using the software. If it is a desktop-based application , then some key piece of functionality would

Cracking C# application with OllyDebug

给你一囗甜甜゛ 提交于 2019-12-06 02:09:00
问题 I would like to know if there is a way to crack C# Windows application with OllyDebug. I have simple my own CrackMe application written with Visual C# 2010 Express. When I open it with OllyDebug and modify ASM code as I need, there is no "Copy to executable" option in OllyDebug since my registration form window is dynamically allocated with "new" operator (which is, I believe, VirtualAlloc() function call in debugger). Though I am able to modify ASM code (which is simply NOP'ing JE jumps), I

What is the Best way to create a program which works only in the predefined trial period(evaluation period)?

馋奶兔 提交于 2019-12-04 14:59:11
I need to create a simple application that doesn't work after 30 days. How can I do that ? Is there a way to use Trial program after 30 days ? There is always a way to use a trial program after 30 days. If by "best" you mean least breakable, then there is really only one way: make it an Internet-based "software as a service" application. If you don't provide access, they're not using the software. If it is a desktop-based application , then some key piece of functionality would still have to be on an online server somewhere. If the hacker has the entire application on their local machine, it

Software protection for small vendors

时光怂恿深爱的人放手 提交于 2019-12-04 07:44:15
问题 This is a problem we all have to consider at some point. After many years and many approaches I tend to agree in general with the staterment: "For any protected software used by more than a few hundred people, you can find a cracked version. So far, every protection scheme can be tampered with." Does your employer enforce the use of anti-piracy software? Further, every time I post about this subject, some one will remind me; "First of all, no matter what kind of protection you'll employ,a

Cracking C# application with OllyDebug

巧了我就是萌 提交于 2019-12-04 06:56:42
I would like to know if there is a way to crack C# Windows application with OllyDebug. I have simple my own CrackMe application written with Visual C# 2010 Express. When I open it with OllyDebug and modify ASM code as I need, there is no "Copy to executable" option in OllyDebug since my registration form window is dynamically allocated with "new" operator (which is, I believe, VirtualAlloc() function call in debugger). Though I am able to modify ASM code (which is simply NOP'ing JE jumps), I am not able to save my .exe file with cracked code, looks like OllyDbg "sees" the code in data segment