Cracks, Script, and Exploits

Today we are going to talk about the bread and butter of the hacker world. Getting into the nitty gritty of what we are looking for. When you are working as a locksmith in Dayton, you need to know what tools are at your disposal. Because of that, we are going to review cracks, scripts, and exploits.

What are Cracks

“A crack refers to the mean of achieving software cracking, for example, a stolen serial number or a tool that performs that act of cracking. Some of these tools are called keygen, patch, or loader. A keygen is a handmade product license generator that often offers the ability to generate legitimate licenses in your own name. A patch is a small computer program that modifies the machine code of another program. This has the advantage for a cracker to not include a large executable in a release when only a few bytes are changed. A loader modifies the startup flow of a program and does not remove the protection but circumvents it. A well-known example of a loader is a trainer used to cheat in games. Fairlight pointed out in one of their .nfo files that these type of cracks are not allowed for warez scene game releases. A nukewar has shown that the protection may not kick in at any point for it to be a valid crack.”

What are Scripts

“In computer programming, a script is a program or sequence of instructions that is interpreted or carried out by another program rather than by the computer processor (as a compiled program is).”

What are Exploits

“An exploit is the use of software, data, or commands to “exploit” a weakness in a computer system or program to carry out some form of malicious intent, such as a denial-of-service attack, Trojan horses, worms or viruses. The weakness in the system can be a bug, a glitch or simply a design vulnerability. A remote exploit exploits the security vulnerability without ever having prior access to the system. A local exploit needs prior access to the vulnerable system and usually, involves increasing the privileges of the user account running the exploit. Those who utilize exploits often use social engineering to gain critical information needed to access the system. Many crackers (or hackers) take pride in their knowledge of software exploits and post them to a website to share or boast with other crackers. “


While I can only brush up on each one of these, the best way to learn them is to open the code file in code blocks or notepad++ and fiddle with the code and see what happens, see what happens if you can cause an override or something like that, Then you will begin your journey properly and move from some hack in Dayton to who tey call for emergency locksmiths in Cincinnati.

Hello again, it is I, Dutch. Here to give you some fundamentals and ideas of where you can continue learning if you truly desired it. Today we are going to talk about sudo-hacking as in we are going to talk about Linux.

Linux is a distro similar to Windows and Mac except we can use it with much less resources than the other which is ideal for lean computing. One of my friends who taught me about linux now works as a locksmith in Aventura and he says that the two are one in the same.

What is Linux

Linux is an open os which means anyone can take it and run with it. But it is comprised of different terms that are specific towards the OS itself.

“The OS is comprised of some pieces:
• The Bootloader: The software that manages the boot process of your computer. For most users, this will simply be a splash screen that pops up and eventually goes away to boot into the operating system.
• The kernel: This is the one piece of the whole that is called “Linux”. The kernel is the core of the system and manages the CPU, memory, and peripheral devices. The kernel is the “lowest” level of the OS.
• Daemons: These are background services (printing, sound, scheduling, etc) that either starts up during boot or after you log into the desktop.
• The Shell: You’ve probably heard mention of the Linux command line. This is the shell – a command process that allows you to control the computer via commands typed into a text interface. This is what, at one time, scared people away from Linux the most (assuming they had to learn a seemingly archaic command line structure to make Linux work). This is no longer the case. With modern desktop Linux, there is no need to ever touch the command line.
• Graphical Server: This is the sub-system that displays the graphics on your monitor. It is commonly referred to as the X server or just “X”.
• Desktop Environment: This is the piece of the puzzle that the users interact with. There are many desktop environments to choose from (Unity, GNOME, Cinnamon, Enlightenment, KDE, XFCE, etc.). Each desktop environment includes built-in applications (such as file managers, configuration tools, web browsers, games, etc.).” –

How to Hack it?

Because there is an open terminal, it is highly possible to change, alter, and hack aspects of a Linux build with relative ease. In fact there is a theory that suggests that all viruses are from Linux and converted from there. Similar to how you get to have a mobile locksmith in Miami.

“Passwords are the sole criteria of system Security for most of the System. Moreover, when it comes to Linux, if you know the root password you owns the machine. Passwords are as a Security measure for BIOS, Login, Disk, Application, etc.
Linux is considered to be the most Secure Operating System to be hacked or cracked, and in reality it is, still we will be discussing some of the loop-holes and exploits of a Linux System. We will be using CentOS Linux throughout the article as an article to crack our own machine’s security.” – TecMint

More Research Material

There’s a great little game called ScopeCreep that can help you learn more about Linux and hacking. Check it out now!