Cracking Software with Reverse Engineering 😳

  Рет қаралды 1,758,465

nang

nang

Күн бұрын

Пікірлер: 1 000
@Solenya.
@Solenya. 2 жыл бұрын
I followed the steps in this tutorial and then when I patched it my antivirus said it was a trojan and quarantined it lol.
@xShifty
@xShifty 2 жыл бұрын
Same lmao
@mikk0706
@mikk0706 2 жыл бұрын
yeah
@mohammedissam3651
@mohammedissam3651 Жыл бұрын
So what , at least you know what's inside ur code, it's not attached with bad stuff made by **** unknown person. You can allow it to stay "the virus".... MS defender can find cracked softwares and treat them like viruses.. It's illegal yes but man sometimes you don't have money and you want to just learn, learning stuff should be free. When it comes to production things would be different money will not be issue then and only then "money made for spend". First let us learn so we make money so in the future if ur software worth the credit will pay for sure 😊 with a huge smile 😁.
@lee.is.here1
@lee.is.here1 Жыл бұрын
​@@mohammedissam3651 agreed
@miweneia
@miweneia Жыл бұрын
Imagine using an AV
@RD-eh3tz
@RD-eh3tz Жыл бұрын
I've always struggled understanding registers, but as someone with an uncle that's on the same register as yours, I now fully understand them, thanks! #FreeAllUncles
@nang88
@nang88 Жыл бұрын
So true!! 🙌🙌
@hingsing1
@hingsing1 Жыл бұрын
#FreeAllUncles💀
@ridiculous383
@ridiculous383 Жыл бұрын
#FreeAllUncles
@RohitCantSing
@RohitCantSing 10 ай бұрын
​@@nang88lmfao the word 'nang in my language means 'broke af' and the context of this video just makes that even better 😂
@olliwesselingh9253
@olliwesselingh9253 Жыл бұрын
Honestly you're a massive help, you not only made the concept easy to understand, but you made it really funny to learn about it.
@whybkah
@whybkah Жыл бұрын
"unfortunately" this is not even the tip of the iceberg, there is still a long and painful way to go if you really want to be a reverser enginer.
@RandomTutorials2012
@RandomTutorials2012 Жыл бұрын
@@whybkah the point is that it’s enough to get someone interested - I know I am for sure
@_FrozenPotato_
@_FrozenPotato_ Жыл бұрын
I always wondered how people made cracks and stuff, now that I've learnt some computer science and watched this video, I didn't realise it could be so simple.
@hjrgf
@hjrgf Жыл бұрын
Also if you want an open source reverse engineering tool use ghidra its really good
@GamerFigure
@GamerFigure Жыл бұрын
well, for most software it’s not. This program has no code obfuscation so its quite trivial.
@qwerte6948
@qwerte6948 Жыл бұрын
well this is obliviusly made for example tho
@yousseffx9508
@yousseffx9508 Жыл бұрын
nah bro he has the the source code but when you deal with with compiler it's hard
@X3S000
@X3S000 Жыл бұрын
@@GamerFigureyes but I think they’re just surprised how easy it is to wrap your head around this stuff. Every system seems so complex until you break it down, step by step and practice until it becomes trivial. Those who don’t practice will never get better and can’t gain the necessary wisdom that comes with time.
@JmoJustyn
@JmoJustyn Жыл бұрын
See this is the kind of content people need to watch when researching complex topics like this. Literally just needed a small bit of Info from this video and got it In seconds good job!
@mrdevtoilet
@mrdevtoilet Жыл бұрын
"instead of storing little kids these registers store data" was the line that made me subscribe
@ozzy2361
@ozzy2361 Жыл бұрын
I took an assembly class in college. We did a ton of of projects. I had no idea that it's this easy to exploit an application. pretty awesome
@nang88
@nang88 Жыл бұрын
yessir
@NameLess-fh1oo
@NameLess-fh1oo 9 ай бұрын
most modern softwares won't let you this easily
@chrishultberg4223
@chrishultberg4223 Жыл бұрын
I've been into reverse engineering since way back in 1998, so I have some experience in this area. I just wanted to say that your video is pretty good, and I appreciate your honesty about your skillset. I have a few suggestions, though. It would have been helpful if you explained the JMP (jump) and why you made changes to that particular code. Additionally, it would have been better if you mentioned the option of using NOP (no operation) as an alternative. In this case, if you NOP the code at 4012BC, it would automatically move on to the next line. Ultimately, you achieved the same outcome by making it jump to 4012BE, but it's worth noting that you could have just NOPed the jump, especially since the "Good Boy" comes first in the code. It would have been beneficial if you also explained what JNE means and what the comparison was. Another suggestion I have is to use a breakpoint at 4012AB, then proceed to the next line and examine the stack. If you did that, you would see your correct serial number pushed onto the stack. Anyway, your tutorial was very easy to follow, especially for beginners. Great job!
@liloufdezlaralopez8334
@liloufdezlaralopez8334 Жыл бұрын
if I had a program with different .exe, because each of them are a piece of the whole program 60GB, How do I know which one to crack? programs name is Siemens Tia V17
@jackieAZ
@jackieAZ 6 ай бұрын
@@liloufdezlaralopez8334 Oof, as a controls engineer good luck with that one lol
@Ewin501
@Ewin501 4 ай бұрын
@chrishultberg4223 Hi, I want to become a reverse engineer by self-studying. Can you please recommend videos that are beginners-friendly to follow? This one was understandable, but like someone in here said, that programs these days are not that simple.
@chrishultberg4223
@chrishultberg4223 3 ай бұрын
@@liloufdezlaralopez8334 In order to figure that out, you would just follow the code, line-by-line until you end up in the code that needs modification. When debugging applications, they will load the required resources or additional ".exe" files as needed and ultimately, you should end up on a line or routine that you would need to modify in order to meet your needs. Sometimes it's a ".dll" file that the executable has loaded and you would modify that file the same as you would a ".exe". I hope this helps.
@chrishultberg4223
@chrishultberg4223 3 ай бұрын
@@Ewin501 Do a search for "crack-me" tutorials and videos. These applications are designed specifically to practice on and are a great place to start. If you do not know how to code, it would be wise to educate yourself in the basics of programming before you dive into reverse engineering.
@jacobczekalla8375
@jacobczekalla8375 Жыл бұрын
Another simple solution is just changing the opcode relative address to 00 instead of 16 so it becomes "75 00". As 75 is the i386 opcode for JNE("Jump if not equal") instruction it will just jump to the line after the instruction. A different way to think about it is like the following. if(key != correct) { correctKey(); } else { correctKey(); } Both paths lead to the same function in memory.
@thethiny
@thethiny Жыл бұрын
Why would we want that
@thethiny
@thethiny Жыл бұрын
@@jacobczekalla8375 I think then there's a typo in your comment
@jacobczekalla8375
@jacobczekalla8375 Жыл бұрын
@@thethiny Ahh yes, fixed it lol. Thank you.
@thethiny
@thethiny Жыл бұрын
@@jacobczekalla8375 lol was confused
@youxtubexisxgay
@youxtubexisxgay Жыл бұрын
@jacobczekalla8375 You understand well. I've done this numerous times over the years, usually to get a key for abandonware.
@MisterElliot
@MisterElliot Жыл бұрын
Bro just explained my entire Year 1 C++ class in 8 minutes
@imamoronand9199
@imamoronand9199 Жыл бұрын
this video has such like 2008 youtube vibes. I’m a fan
@Ruin3.14
@Ruin3.14 Жыл бұрын
This is honestly a lot more straight forward and easier than I expected.
@shebadoge
@shebadoge Жыл бұрын
Your programming skills are nice! You should start a KZbin channel.
@nang88
@nang88 Жыл бұрын
Ill think about that!
@faketask5529
@faketask5529 Жыл бұрын
​@@nang88 I have I doubt. Can the compiler compile my ass?
@iRouRoui
@iRouRoui Жыл бұрын
@@faketask5529 why don't you give it a try, film the process
@faketask5529
@faketask5529 Жыл бұрын
@@iRouRoui Trust me bro I tried that but KZbin sent me some policy violation stuff... I don't know mannn.
@zanotellitb5457
@zanotellitb5457 Жыл бұрын
he already has one, otherwise you wouldn't be watching this video. You probally commented in the wrong tab tho
@shane45454
@shane45454 2 жыл бұрын
I was looking for this the other day and was so pissed that i couldnt find it, started to think it never even existed
@idus
@idus Жыл бұрын
haha so glad you made this. You stitched the fragments I had in my mind into a complete fabric of understanding.
@fusseldieb
@fusseldieb Жыл бұрын
I'm on the same boat. I think I now have enough understanding to try it :)
@NevoeT2k9
@NevoeT2k9 Жыл бұрын
Is this poetry?
@tylermorgan1654
@tylermorgan1654 Жыл бұрын
I’m currently working towards an It degree, and I’m almost done. I straight up learned more from your quick video than I have in any of my classes. Awesome vid man!
@tbuk8350
@tbuk8350 Жыл бұрын
Another important thing to mention is that not every registry key system works like this. 99.99% of modern implementations call back to a server that can validate if the key exists, and it's randomly generated per user meaning the only way to crack it is to either remove the key check from the client, or to get the server to generate a key for free.
@Santificated
@Santificated Жыл бұрын
can people crack modern games by removing the key check from the client, or to getting the server to generate a key for free? is it possible to do either one of these two things at all?
@sly-shot
@sly-shot Жыл бұрын
​@@Santificated Some games are vulnerable to being cracked and able to go online, but for most games any offline play can be made available just by skipping the online check, yeah.
@bobbuilder3748
@bobbuilder3748 Жыл бұрын
Clearly you pulled that 99.99% figure out of a certain orifice. Many developers are opposed to their applications having any sort of call home function, not just for privacy reasons, but also because it places limitations on how and where users can use the software. You can also use public/private key encryption to verify a key is legitimate, without calling home. Personally, I don't really mind if people choose not to pay for my software and just use a cracked version. Props to those who crack it themselves.
@sly-shot
@sly-shot Жыл бұрын
@@bobbuilder3748 using offline public/private key encryption to verify a key is vulnerable to reverse engineering, and so any application one might seriously want to crack that the creators seriously don't want cracked will use call home DRM as OP describes. Not sure how either of you are getting your data, though.
@bobbuilder3748
@bobbuilder3748 Жыл бұрын
@@sly-shot Correct. Public/private keys will not prevent reverse engineering. It's still possible to bypass the key checks, but it prevents key generators from being distributed that will work against unmodified releases. I'm not supplying hard data, just observations from my 20+ years working in the industry. I live in a country with strict privacy laws (although about 8 years was working for multi-national companies), so perhaps it's different elsewhere, but any time a call home feature is suggested, there has always push back from developers.
@Aint1S
@Aint1S 2 жыл бұрын
The tools are way better some 24 years later! I used to do this with a hex editor for fun... Because the games usually aren't as fun! The shock of seeing what they did to create a more difficult keying code was fun. Some were NASTY the more money you had to sink into what it was back then... I'm trying to fix old GTA 2 to stop checking for the darn disc and spinning it like crazy! My vintage PC rig is vintage enough that I don't want to see it lose the DVD drive... Unreal 4 at 560 fps on older hardware is to crazy!
@W33PING-VIK1NG
@W33PING-VIK1NG Жыл бұрын
3:52 #freemyboyuncleKenny 🙏
@Zed_eS
@Zed_eS 2 жыл бұрын
damn dude, barely a minute in and I love the content. Keep this up, you're talented! :)
@xperrttt
@xperrttt Жыл бұрын
3:30 was just crazy with the music as well great job on the vid btw
@joshmarkovich4608
@joshmarkovich4608 Жыл бұрын
That one joke about your uncle, made me subscribe. Hilarious dude. 😂 instead of storing kids... omfg
@bobfarker4001
@bobfarker4001 Жыл бұрын
Registers are where the processor temporarily stores data. Your program is loaded into memory and arithmetic is done by the processor.
@saintsdgessus8823
@saintsdgessus8823 Жыл бұрын
so this is how normal ppl start learning reverse engineering. I just jumped straight into the difficult stuff, didn't get anything since the program was rather complex and used multiple system libraries and i just dropped the shit even knowing a little more about computers than this vid explains
@smburhan6323
@smburhan6323 Жыл бұрын
Loved the explanation!!
@bossysmaxx3327
@bossysmaxx3327 Жыл бұрын
2:21 I was literally picking my nose dude
@YikesKris
@YikesKris 2 жыл бұрын
i have nitifications on but i never got notifs for the last 2 videos lmao -- only reason I checked the channel again was cuz of some bot in ur comments .. but I remember this being a good video so .. good reupload :D
@nang88
@nang88 2 жыл бұрын
ily. yeah idk about these bots LMAO
@Behdad47
@Behdad47 Жыл бұрын
I did this exact "exercise", although with no UI in Linux and a really primitive debugger, in my Assembly Language course in my fifth semester. I remember looking for the password for five days while searching through thousands of registers and trying different subroutins until I realized that I could just change JNE to JMP and be done with it 😂.
@oksowhat
@oksowhat Жыл бұрын
did you saw the first airplane fly??
@OpenGL4ever
@OpenGL4ever 11 ай бұрын
In the crackme community you are expected not to simply change the binary file (also called patching), but to write an external program that provides you with valid keys. Only then have you really solved the task. The reason is simply because patching is far too easy.
@Epic737636923
@Epic737636923 Жыл бұрын
Why am I watching this at 5 AM?
@Italya3343
@Italya3343 Жыл бұрын
Thank you so much for sharing your amazing video with us! Plz consider start a playlist solving all the challenges in the website you mentions, like once a week. Thanks in advance!
@aleeex2683
@aleeex2683 4 ай бұрын
"educational purpose" is the only 2 words keeping this video safe 💀
@DWal32
@DWal32 Жыл бұрын
so you basically convert a program into assembly code, find an error message that gets sent when you put in the wrong code, look for that in the assembly code using memory spots instead of variables/strings, then attempt to understand how jump if not equal statements work, and then find the conditionals for that statement. and that's how you hack into ubisoft :)
@makuru.42
@makuru.42 Жыл бұрын
Well that a lot more complicated because of denuvo and stuff
@gastonbuesas2081
@gastonbuesas2081 6 ай бұрын
this video is explaining something that look very f#cking overwhelming and yet it does in a hillarious way and it do teach how to no get intimidated by assembly, good job dude
@some_lurker
@some_lurker Жыл бұрын
I mean...that's not what they mean when they say write a keygen. The whole point is to reverse engineer the algorithm to find out how the password is created for the given username. While this is technically a "key generator", you're still just patching the program.
@2macki332
@2macki332 10 ай бұрын
This is the best explanation (so far) I have seen on YT. Great work mate!
@USSteal
@USSteal 2 жыл бұрын
Your outro music has not improved. But again - great vid
@AdamDaviesSussex
@AdamDaviesSussex Жыл бұрын
Very top-level breakdown. Takes me back to the good old days. I miss old apps being weak, like Winzip %04x%04x byte patch. RIP jne 9090.
@jev21
@jev21 Жыл бұрын
you deserve more subs keep doing what you do man!!
@nang88
@nang88 Жыл бұрын
I appreciate that!
@guilhermekfwst
@guilhermekfwst Жыл бұрын
Thanks Doublelift!
@Silencez
@Silencez 2 жыл бұрын
Thank you, I managed to create my own crack on this.
@MarkVank
@MarkVank Жыл бұрын
Damn fr? hahahahahhahah
@nikable
@nikable Жыл бұрын
bro uncle kenny caught me off guard. great video thx
@od1sseas663
@od1sseas663 Жыл бұрын
Now try cracking it when protected with VMProtect 😂😂😂
@Hueycoy
@Hueycoy Жыл бұрын
this video led me to take the computer architecture course at my school. thank you for opening my eyes man. i might have graduated with cs without ever touching assembly
@GofeHD
@GofeHD Жыл бұрын
This was a legitimate intertaining video ! In a world of short span attention this kept me intertained ! Congrats
@12chachachannel
@12chachachannel 9 ай бұрын
0:54 Imagine we were writing code in the language we DON'T understand.
@bachibak
@bachibak 5 ай бұрын
oh you can, ever left a project alone for a few months? good luck reading that cobbled mess again
@Pazuzu-2048
@Pazuzu-2048 Жыл бұрын
Cool. I remember downloading cracks and keygens back in the day. There was always that moment of hesitation. Do I want to keep using this software or do I risk getting a virus? The best keygens were the ones with that kickass midi music.
@Rijads
@Rijads Жыл бұрын
sony vegas 8
@xou.
@xou. 2 жыл бұрын
coolest dude on earth😎⁉️
@Mr.D7ome
@Mr.D7ome 2 жыл бұрын
Fact
@jackieAZ
@jackieAZ 6 ай бұрын
As someone who has some programming background but is oblivious to this stuff, awesome video. Was super easy to follow
@johndeaux8815
@johndeaux8815 Жыл бұрын
Just downloaded x64dbg and gave all this a shot, it was piss easy! Just going off memory (no pun intended) and clicking through the video a couple times I got it done in less than 30 minutes, and the second time I did it, while screenshotting each step to my mate, took me around 6 minutes. Super educational video!
@devarshihazarika4871
@devarshihazarika4871 Жыл бұрын
3:50 best definition of registers.
@roby_mrg8995
@roby_mrg8995 Жыл бұрын
How tf did u know i was picking my nose
@aidenallen1167
@aidenallen1167 6 ай бұрын
Reverse engineering
@st4r-superusr-root
@st4r-superusr-root 3 ай бұрын
disgusting asf
@YRH2
@YRH2 Жыл бұрын
I'm hoping for you're future KZbin contents, New subscriber here!.
@nang88
@nang88 Жыл бұрын
Thanks! Lots coming :)
@TEDBET622
@TEDBET622 2 жыл бұрын
Even better the second time
@He-Is-One-and-Only
@He-Is-One-and-Only Жыл бұрын
Stay away from your Uncle 😂😂😂
@blueknight9748
@blueknight9748 2 жыл бұрын
ok,,,, but what do you do if there are no strings to go off of?????? most of the time there wont be strings..
@FateShape
@FateShape Жыл бұрын
For ethical hacking and education purposes, you are the goat!
@enesk2120
@enesk2120 2 жыл бұрын
bro your content is great. keep up the good work!
@letsavitpodcast
@letsavitpodcast Жыл бұрын
F*** it, I love this guy, subscribe button smashed my friend 😂
@AJ12Gamer
@AJ12Gamer Жыл бұрын
These are basically new outdated tuts. Man I'm old.
@quadroninja2708
@quadroninja2708 Жыл бұрын
I think of it as basic instead of outdated. Cracking programs with modern means of defence would probably be too hard and boring for the target audience
@thahrimdon
@thahrimdon 8 ай бұрын
BRO SAID DON’T PICK YOUR NOSE FRIENDLY REMINDER AS I WAS PICKING MY NOSE
@nickirichards5617
@nickirichards5617 Жыл бұрын
Great video! Super clear and entertaining :) Question tho... What if you can't find the string with the dialogue from the registration box? I've tried searching for every bit of text in there, but I can't find anything as cut and dried as the "bad boy..." example. How do I find the right code if I can't search something that specific?
@koray6261
@koray6261 11 ай бұрын
Same issue with a program called "My Recover". Presumably not a rare issue to encounter. So it would be surely worth to address instead of leaving it unanswered.
@tsukikage8
@tsukikage8 2 ай бұрын
I used to be mind blown that people could make this type of stuff. and i wouldn't have known where to start even now, but i've been working on my bachelors in compsci and just took computer architecture & assembly language maybe 2 quarters ago and could actually understand the assembly stuff which felt pretty cool!
@FolksOfBeaveryTown
@FolksOfBeaveryTown Жыл бұрын
Thx a lot!!! The video was totally helpful for me to understand on the spot how the crack files are made.
@carchang4843
@carchang4843 Жыл бұрын
LMAOO 3:44 Genuinely super super informative.
@Coledebord2
@Coledebord2 2 жыл бұрын
Or you could just byte patch the jump instruction in a hex editor after you find the location in your debugger. No key gen required.
@trixiz8647
@trixiz8647 2 жыл бұрын
could you teach me how
@ant-mf6kl
@ant-mf6kl Жыл бұрын
Yes, which is why crackmes usually have a no patching rule so you can actually experience the challenge
@thethiny
@thethiny Жыл бұрын
​@@trixiz8647 ignore him, the guy did it in the video.
@severedshisui5667
@severedshisui5667 10 ай бұрын
Wow, one of the first hacking videos on KZbin that is straightforward and easy to understand.
@emilyisoffline
@emilyisoffline 2 жыл бұрын
Thank you nang. Very cool.
@ReligionAndMaterialismDebunked
@ReligionAndMaterialismDebunked Жыл бұрын
NK. Hahhaha. One of my targets, NK. XD 💀😅😂 Great video, bro bro! Entertaining, indeed. Hehe. I found you in my feed, liked, subbed, and shared. Fellow ethical hacker.
@ZaadSoldaat420
@ZaadSoldaat420 Жыл бұрын
Really nice and interesting video man. Made it very entry level to understand. Loved it
@Mx.Dmg1999
@Mx.Dmg1999 10 ай бұрын
As long as you can get into the base data anything can be changed, the keygen got an uno reverse card lol
@ahhhhhhhhhhhhhhhhhh583
@ahhhhhhhhhhhhhhhhhh583 2 жыл бұрын
Didn’t even notice it was gone😂
@stt.9433
@stt.9433 Жыл бұрын
Yeah that was pretty straight forward, as long as you're able to read assembly. That explains why almost every login or password system I've ever came across uses servers.
@GuiltyGaming
@GuiltyGaming 2 жыл бұрын
Great video, though a bit over my head. I came here because I want to debug/decompile a databin unpacker--the one tool that's out there seemingly doesn't extract everything and I have no idea the compression method used to try and get into it myself. I have my own tutorials on hex editing save files and messing around with a game's active memory to make instant changes, but this would be a leap for me. If you check your comments, would you be willing to give me some direction? Thanks.
@robinhood768
@robinhood768 Жыл бұрын
💀 that uncle joke tho
@GoGicz
@GoGicz Жыл бұрын
i actually learned something, thanks for this video.
@nIkI_nazarov
@nIkI_nazarov Жыл бұрын
6:40 "eatassdiefast" Wot?!😂
@Marco-uo9ww
@Marco-uo9ww Жыл бұрын
If the key on this crackme is always the same then it is not that much of a challenge. A crackme in which you HAVE to understand the algorithm that generates a different key for each user and you have to do it without bytepatching would be way harder than this. Even then, compared to the amount of obfuscation, anti debug measures that software has nowadays, makes cracking a bitch to deal with.
@OpenGL4ever
@OpenGL4ever 11 ай бұрын
You can still debug using the integrated debugger of an emulator.
@karmenjell2206
@karmenjell2206 10 ай бұрын
Exactly, you will have to regenerate (Pseudo) Code for the algorithm that takes String as an input and generates an Int by passing it through the function call of the algorithm.
@willie9899
@willie9899 10 ай бұрын
I like to make these more challenging- You could make it autofill the password field with the correct code, or even just bypass the entire login on start up.
@iulian_98
@iulian_98 Жыл бұрын
Hello, can I ask you something, maybe you will find it interesting. A ransomware called x101 encrypted my . 500 gb in one minute. The files now have the extension .x101 . After researching the vrus seems very new, it's about half a year old and from what I've read about OTHER ransomware I think my files were partially encrypted, just the beginning and maybe the end. The files are TS video files from 700mb - 4GB each. Fortunately, I had saved some files on an external SSD. It appears that the encrypted files are exactly the same size as the original unencrypted files on the external SSD. I already tried to snap the extension back in place, it didn't work :)))) why did I think it would work? Is there any possibility to find the encryption mode by comparing an infected file with the uninfected one (identical file) or to delete the encrypted part and leave the code unencrypted and the video will go, possibly missing the beginning and the end? With what program could I open them to see the binary code consisting of 0 and 1? Which is better according to you, free and open source if possible. I know there is always a pensource / free variant.
@unfunf22
@unfunf22 Жыл бұрын
it could work if you know what exactly changed when you compare the 2 files
@Happns
@Happns Жыл бұрын
friend building chair speaking chinese had me subbed
@Steve-Richards
@Steve-Richards 2 жыл бұрын
Hey Great Video I have programs like a software to dim the monitor light. The problem is his background is the normal standard program withe. It blends me every night if I will dim the light. I really wish the background of it would be dark. Can you show how to Reverse Engineer a software and make his background like dark mode ? program I mentioned is Free Monitor Manager but it could be any. Greetings
@joebloggs4925
@joebloggs4925 2 жыл бұрын
use lux
@Steve-Richards
@Steve-Richards 2 жыл бұрын
cool thanks!
@devonbauman4575
@devonbauman4575 Жыл бұрын
solid intro to reversing
@Asiaspartan6354
@Asiaspartan6354 2 жыл бұрын
Cool, always learn from you. Impressive
@teddyjohnson284
@teddyjohnson284 2 жыл бұрын
nice vid man
@MAHIM2000
@MAHIM2000 Жыл бұрын
Rich Brian do be teaching us Reverse Engineering fr
@pal181
@pal181 Жыл бұрын
Now I can't wait to see why DENUVO is so hard to crack.
@georgespaceagency9894
@georgespaceagency9894 Жыл бұрын
Exactly, and it's worse when the only person able to crack it is crazy and former a cult.
@untitled4373
@untitled4373 Жыл бұрын
Love that in 2023 youtube hacking videos are like this. Many years ago I was attempting this for my first time, if I had your video it would have been so much easier.
@AllinBeats
@AllinBeats 2 жыл бұрын
Ayy its back, f youtube
@NeroNORirl
@NeroNORirl Жыл бұрын
didn't even know that this was known as reverse software engineering. we did a lot of this back in the day when we wanted something (like flashfxp for xbox modding). me and my buddy used hexeditor and learned by fkn around and screwing everything up. just had to identify where to do changes. was way easier back in the day though.
@p060477
@p060477 2 жыл бұрын
how with online activation programs...??
@mycoreefer
@mycoreefer Жыл бұрын
Free Kenny bro he ain't do nun wrong 🕊🕊
@stephinkoshyskj
@stephinkoshyskj 2 жыл бұрын
can we crack idm with this??
@ultimatemder
@ultimatemder 2 жыл бұрын
yeah :)
@LCfer
@LCfer 10 ай бұрын
I used to do cracking and keygening in my high school and university time too (learn mostly from Lena’s tuts. Miss her.. 😢). Now I don’t have time and energy to do that anymore. So instead I watch people do it for the nostagic feeling. You may do the same later at my age 😂
@Micaniker
@Micaniker 9 ай бұрын
When did you start this at what age?
@Awooochy
@Awooochy Жыл бұрын
3:30 song? xd
@SuperWeirdPCs
@SuperWeirdPCs Жыл бұрын
$oul9 - Perc Freestyle
@WolfyRed
@WolfyRed Жыл бұрын
3:45 Nah bro what the fuck 😭😭😭😭
@Emiroj
@Emiroj 2 жыл бұрын
Is this applicable to software license managers where they provide you with a request key, and then you need to get a activation key from their webpage? Or how do you crack those softwares?
@Francisco-j1e
@Francisco-j1e 2 жыл бұрын
This.
@g76agi
@g76agi Жыл бұрын
I think that is a crime
@Emiroj
@Emiroj Жыл бұрын
@@g76agi you don't say.. Breathing is a crime nowadays
@g76agi
@g76agi Жыл бұрын
@@Emiroj uh huh
@mmmiiiiggg
@mmmiiiiggg Жыл бұрын
@@g76agi stop being such a nerd bro
@JaseewaJasee
@JaseewaJasee 4 ай бұрын
love your dynamic approach to creating engaging content!
@serhumanodebonsai7751
@serhumanodebonsai7751 2 жыл бұрын
Awsome video!!!!
@harutanaka3647
@harutanaka3647 Жыл бұрын
how about how to crack paid chat faking dating site
@harutanaka3647
@harutanaka3647 Жыл бұрын
@4helpcontacNNUELHACKoninstagram do u have solution for it? all these fake dating site collecting members $ to continue chat to their low level AI. Never will meet living live person even on a video chat. Government not doing anything. We need a Robinhoid to take care it.
@じゅげむ-s6b
@じゅげむ-s6b Жыл бұрын
I thought the registered offender joke was random, but the "instead of storing kids" part got me
How to Crack Software (Reverse Engineering)
16:16
Eric Parker
Рет қаралды 711 М.
God-Tier Developer Roadmap
16:42
Fireship
Рет қаралды 7 МЛН
快乐总是短暂的!😂 #搞笑夫妻 #爱美食爱生活 #搞笑达人
00:14
朱大帅and依美姐
Рет қаралды 11 МЛН
Long Nails 💅🏻 #shorts
00:50
Mr DegrEE
Рет қаралды 7 МЛН
Из какого города смотришь? 😃
00:34
МЯТНАЯ ФАНТА
Рет қаралды 2,3 МЛН
Learn Reverse Engineering (for hacking games)
7:26
cazz
Рет қаралды 1,1 МЛН
Making an AI Onlyfans with Computer Science
11:48
nang
Рет қаралды 3,3 МЛН
GHIDRA for Reverse Engineering (PicoCTF 2022 #42 'bbbloat')
17:44
John Hammond
Рет қаралды 219 М.
I made FLAPPY BIRD in DUMB programs
19:35
Code Bullet
Рет қаралды 1,9 МЛН
How Do Hackers Crack ANY Software
5:54
CyberFlow
Рет қаралды 949 М.
20 Programming Projects That Will Make You A God At Coding
14:27
The Coding Sloth
Рет қаралды 1,4 МЛН
How One Man Hacked Hypixel...
15:15
TGWaffles (Thomas)
Рет қаралды 592 М.
I Reverse Engineered this Program Automatically.
16:53
Low Level
Рет қаралды 77 М.
快乐总是短暂的!😂 #搞笑夫妻 #爱美食爱生活 #搞笑达人
00:14
朱大帅and依美姐
Рет қаралды 11 МЛН