Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Ollydbg Tutorial #8 - Basic Software Cracking

 

Rating :

 

Comments

 
  • multarnc
    multarnc at November 17,2017
    The quality of this video is much lower than the previous tutorials, making it difficult to read. This is useful during code development to test how secure your code is. As I mentioned in a previous comment, passwords should never be stored in cleartext and the authentication function should not be performed within the executable. I find it hard to believe that many developers still use such poor coding practices. No large software developer makes their keys this easily bypassable or discoverable, as many require online validation prior to usage and almost always require revalidation when performing updates.
  • mcarpiom
    mcarpiom at November 20,2017
    I like that this video brings up the point about actually finding a good vs. bad message. It would be helpful if the explanation of the process was more specific and went further into details. Also, it was interesting to see how the username and password were obtained. While this tutorial gave me a great basis, I would like to see this technique on a more complex program that carries a more complex form of authentication in place and see how one would get around those obstacles.
  • secallahan
    secallahan at December 05,2017
    I thought the other videos were more insightful than this one. It often seems like the narrator isn't completely sure what he's doing or trying to achieve.
  • ahmadh456
    ahmadh456 at December 09,2017
    Since each application is built using different languages and application development software, I can't imagine this working for majority of applications out there. It's a good tool to use to examine and analyze applications to see what it processes in the backend.
  • SarahDavis
    SarahDavis at December 12,2017
    Even though this is very cool and it shows how to find the password, I feel like this video is repetitive of the past few in this series. I know the information is different, slightly, but it all just sounds very repetitive. But, I do like how this video shows you exactly how to find the password.
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved