How to Avoid Detection of Fake Serial or Cracked Operating Systems on Internet?

Discussion in 'Ethical hacking Tips' started by pankaj.sea, Oct 9, 2009.

  1. pankaj.sea

    pankaj.sea New Member

    Joined:
    Apr 6, 2009
    Messages:
    461
    Likes Received:
    13
    Trophy Points:
    0
    Occupation:
    Web Developer
    Location:
    Kolkata
    Home Page:
    http://ipankaj.net
    Disclaimer: I’ve written this article for educational purpose only!

    Introduction



    While using a duplicate or a cracked copy of operating systems or some application softwares, some time we get a message from the software vendor that “You Are Using A Duplicate Copy of XXXX Software!” and then the cracked SW or OS gets blocked or some features of the software gets blocked or the particular application software stops working! Now what to do? For solving this problem you may re-install the application software or you can re-install you OS, but if you maintain some simple steps, you may avoid this type of duplicate software detection!

    What’s the matter?



    Actually, now-a-days, all the application software has a feature that allows updating it automatically! For this job, every time you connect to the internet, the SW connects it self to its server, so while it contacts with its server, every time it check the serial number or the registration info with the server’s database! Now, the server holds two type of serial’s database, one is of the original serials and another is of blacklisted serials which have detected previously by itself as fake serial! And if your serial or registration info belongs to the blacklisted database or not matched with the original database, then the software gives the message “You Are Using A Duplicate Copy of XXXX Software!”

    What To Do?



    Simply, you have to turn off the automatic updating feature, which is available at the ‘options’ of the SW! Now, here is another process to stop contacting the server of the SW, you need to re-configure your operating system’s host file, which is a small database of website addresses and their IPs! To do so [In Windows] Go “My Computer -> C: -> Windows -> System32 -> Drivers -> Etc -> Open The “Host” File Using Notepad” Now, in every line, write the targeted web address and then give a tab and write IP 127.0.0.1 – this will block this particular websites on your PC!
    Now in case of operating systems, simply turn off the firewall and the automatic updating feature!
     
  2. neo_vi

    neo_vi Member

    Joined:
    Feb 1, 2008
    Messages:
    720
    Likes Received:
    16
    Trophy Points:
    18
    Occupation:
    Software engineer
    Location:
    Earth
    Home Page:
    http://computertipaday.blogspot.com
    This will fail in case of Antivirus,where in u have to update the database. for other programs its a nice trick.
     
  3. pankaj.sea

    pankaj.sea New Member

    Joined:
    Apr 6, 2009
    Messages:
    461
    Likes Received:
    13
    Trophy Points:
    0
    Occupation:
    Web Developer
    Location:
    Kolkata
    Home Page:
    http://ipankaj.net
    Yes! I'm agree with you! But in case of updating database, user can use manual updating!
     
  4. neo_vi

    neo_vi Member

    Joined:
    Feb 1, 2008
    Messages:
    720
    Likes Received:
    16
    Trophy Points:
    18
    Occupation:
    Software engineer
    Location:
    Earth
    Home Page:
    http://computertipaday.blogspot.com
    Yes they can. But the antivirus creators had done it in a different way to detect fake keys. I'll just tell about kaspersky AV. I don't know whether all Av's has similar things like this. In case of Kaspersky AV, even if u download the database manually and update it, it will show "You are using a Blacklisted key, Please purchase Kaspersky". they have mechanisms like this. They are integrating it with updates too.
     
  5. thevallad

    thevallad New Member

    Joined:
    Oct 16, 2009
    Messages:
    2
    Likes Received:
    0
    Trophy Points:
    0
    I am sure many have you have read about "Hacked / Defaced with shells", So I am pretty sure that the first thing that comes to your mind is "What the heck are these shells?" . So this article would give you complete idea about shells and its use.
     
  6. thevallad

    thevallad New Member

    Joined:
    Oct 16, 2009
    Messages:
    2
    Likes Received:
    0
    Trophy Points:
    0
    I am sure many have you have read about "Hacked / Defaced with shells", So I am pretty sure that the first thing that comes to your mind is "What the heck are these shells?" . So this article would give you complete idea about shells and its use.
     
  7. shipra123

    shipra123 New Member

    Joined:
    Oct 13, 2009
    Messages:
    62
    Likes Received:
    0
    Trophy Points:
    0
    Yeah I agree wit you. And I think by implementation of the following tips, one can do it effectively.
     
  8. shabbir

    shabbir Administrator Staff Member

    Joined:
    Jul 12, 2004
    Messages:
    15,375
    Likes Received:
    388
    Trophy Points:
    83
  9. rasd123

    rasd123 Banned

    Joined:
    Nov 4, 2009
    Messages:
    40
    Likes Received:
    0
    Trophy Points:
    0
    Right on, write on about whatever you feel best.
     
  10. shabbir

    shabbir Administrator Staff Member

    Joined:
    Jul 12, 2004
    Messages:
    15,375
    Likes Received:
    388
    Trophy Points:
    83
  11. shabbir

    shabbir Administrator Staff Member

    Joined:
    Jul 12, 2004
    Messages:
    15,375
    Likes Received:
    388
    Trophy Points:
    83
  12. alpha34

    alpha34 New Member

    Joined:
    Dec 2, 2009
    Messages:
    25
    Likes Received:
    1
    Trophy Points:
    0
    Occupation:
    student
    Location:
    somewhere in india
    it's better to put those softwares in blocked state in firewalls or simply use good cracks....
     
  13. technica

    technica New Member

    Joined:
    Dec 15, 2007
    Messages:
    107
    Likes Received:
    0
    Trophy Points:
    0
    Home Page:
    http://www.technicaltalk.net
    WOW! with this I will be able to use some more hacked software. Just kidding.

    Nice information you have shared mate.
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice