The top ten cracking tools for sharing software recommend

  

There are many factors affecting the development of sharing software. Being illegally cracked can be said to be the number one enemy of sharing software. So what are the crackers who have made the sharing software difficult to use? Let me take you to see the ten types of software commonly used by the mysterious cracker, they are the top ten killers of sharing software!

A. Debugging tools soft-ice and trw2000.


soft-ice is the best trace debug tools currently accepted. Using soft-ice can easily track a software, or monitor software generated errors for debugging, it has dos, window3.1, win95/98/nt/2000/version on each platform. This is a tool used to debug, trace, and debug software. It has become the most horrible cracking tool in the hands of cracker; trw2000 is a debugging software written by the Chinese itself, fully compatible with soft-ice instructions, due to the present Many software can detect the existence of soft-ice, and the detection of trw2000 is much worse, so it has become a favorite of many crackers. Trw2000 is optimized for software cracking, tracking debuggers under Windows, and the tracking function is stronger; various breakpoints can be set, and there are more types of breakpoints; it can remove the encrypted shell like some shelling tools. The exe file is automatically generated, so its cracking ability is stronger, and the development of sharing software is more threatening in the hands of crackers. It also has a version under dos called tr.

II. Disassembler wdasm8.93 Gold Edition and hiew.


cracker would often soft-ice and trw2000 likened Tulong, compared to the wdasm8.93 the Heavenly Sword. Wdasm8.93 is a convenient disassembly program that can statically analyze program flow or dynamically analyze programs. On the basis of the original general version, some crackers have developed the wdasm8.93 gold version, which enhances the extraction of Chinese strings. The threat to domestic shareware is even greater. For example, happy landlord this very fun sharing software, with the gold version of its disassembly can directly see the registration code, the normal version can not, you say it is not good? hiew is a hex tool, it is in addition to the ordinary sixteen In addition to the system function, it also has a feature, can disassemble the file, and can use the assembly instructions to modify the program, use it to modify the program, convenient and fast! This is also a static disassembly tool commonly used by crackers.

three. Visual basic program debugging tool smartcheck.


This program is designed for debugging visual basic program, because it is interpreted in essence vb program execution, they just call the function vbrunxxx.dll, therefore vb executable file is Pseudo code, the program is executed in vbxxx.dll. If you use soft-ice to track debugging, you can only use it in vbdll, you can't see the value of the use, and the code quality is not high, the structure is very complicated. Of course, as long as you understand its characteristics with soft-ice can also be cracked, but the emergence of smartcheck, greatly facilitated cracker. Smartcheck is an excellent debugging and interpretation executive tool exported by numega. The latest version is v6.03. It's very easy to use, and you don't even need to know assembly language to easily navigate it. It can completely record the operations performed by the vb program, making it easy for crackers to crack most vb programs.

Four. Hex editor ultraedit.


hex editor can edit files in hexadecimal, modify the contents of the file. Although hiew is a hex tool, it is a dos interface, so many crackers have prepared a tool under windows, such a lot of tools, such as: ultraedit, winhex, hex workshop, etc., which compares ultraedit It is featured, easy to operate, and more available in Chinese. It is a very good hex editor. It is recommended that you also find one.

V. registry monitoring tool main


like regshot, regmon or RegSnap. In the Microsoft operating system, a large number of settings are stored in the registry, the registry is the core database of windows, the table stores various parameters, directly control the startup of windows, the loading of hardware drivers and some windows applications normal operation. When the application software is installed, it is possible to put in some necessary information, such as installation time, usage times, registration code, and so on. Regshot, regmon, or regsnap is a tool for monitoring registry changes. It can be used to understand and monitor the actions of applications in the registry. Crackers often use them to monitor changes in the registry.

VI. File monitoring tool filemon.


can monitor the file system specified operating conditions, such as specifying which file to open the file, which closed the file on which the data file is read and so on. Through it, any file you specify to monitor can be monitored by any operation that reads, writes, and opens other files, and provides complete report information. Crackers often use filemon to monitor the file system to understand what the program does when it starts, closes, or verifies the registration code, and decrypts it accordingly.

Seven. Shelling tool procdump.


now many software plus a shell, "shell" is a piece dedicated to the protection of software against illegal modified or decompiled program. They generally run ahead of the program, gain control, and then complete their task of protecting the software. The packaged software can no longer see its real hex code when tracking, so it can protect the software. Procdump is a tool for shelling software, it can strip a lot of shells, and the original file, so it is much easier to modify the contents of the file. Since it also allows users to write script files themselves, it can be used to remove the shell of the new version of the packer. It is also an excellent pe format editing tools, shelling is an essential tool!

VIII. Such a tool to detect file type tool


there typ, Gtw, fileinfo, and shockwave 2000. They are used to detect the type of software being packed, and Shockwave 2000 can easily find the entry point of any crypto shell, including asprotect and phantom encryption shells. This type of software is generally used in conjunction with procdump and debugging software. Use them to find the type of program shelling, shelling with procdump or soft-ice, trw2000.

Nine. Resource modifier exescope
.

exescope is a tool that can modify software resources, powerful. Exescope can analyze and display different information without resource files, and rewrite the resources of the executable file, including (exe, dll, ocx). It can directly modify the resources of programs compiled with vc++ and delphi, including menus, dialog boxes, and string tables. It is a common tool for Chinese software. In the hands of crackers, it is often used to modify menus, dialogs, string tables, etc. in file resources to display the information needed by the cracker (such as changing copyright information, etc.) to achieve the purpose of modifying the software.

ten. Api call query tool api spy
.

name suggests, this program is used to detect what software called api. The api is the function called when the windows program is executed. It is similar to the int under the dos. Windows provides a lot of such functions for the programmer to apply. The main purpose is to save the software development time and facilitate the development of the software. Api spy is such a software that monitors api calls. It can view which apis are called by the application, and then get the api call information useful to the cracker. These api calls are used to set breakpoints to achieve the purpose of cracking the software. It can work under the windows95/98/nt/2000 platform.

Well, the top ten killers shareware for your introduction is over, how to deal with them is your thing. It should be noted that the above mentioned software is “legitimate” software, but it has been used for different purposes in different users. It is like a gun. It is the weapon of the defending country in the hands of the people's army. It is a weapon in the hands of the bad guys who are not guilty. Never make a prejudice against these softwares!

Copyright © Windows knowledge All Rights Reserved