-
September 3rd, 2006, 04:21 AM
#11
Member
...
Program was made with Visual Basic 6.0 I see... and using PEID I find that its using armadilla protection. I dont know if that matters. Its about 8mb extracted. I could probably even extract the contents of the extracted exe but I dont know if its gonna do any good. I just want to find out what drivers/services/reg entries/ the program is relying on. I know during the install I see files goto c:\windows\system32\ so maybe it would just be useful in this case and in any other case to have some kind of tracking to see what the installer modifies or creates in the case of viruses as well as trying to make something portable. I know UPX could compress it and make it to where its just one file that I need to run the program but I dont even need it to be one file a folder would be just fine to keep on my USB. Well thanks for the help
-
September 3rd, 2006, 04:49 AM
#12
Hmmm,
I find that its using armadilla protection.
Which means that it is someone else's intellectual property, and what you are proposing is illegal.
-
September 3rd, 2006, 06:46 AM
#13
Member
...
I am not talking. Reverse engineering. I do not wish to crack the program. I already "own" the rights to running the program at its current state. Why does this have to be such a technical argument. I was just looking for a program that tells you exactly what the installer does. Isn't this good to know for everyone that wants to be computer security savvy?
-
September 3rd, 2006, 09:32 AM
#14
Look it is simple..
It has copy protection?
Anything else is cracking.. reverse engineering IS CRACKING
I was just looking for a program that tells you exactly what the installer does
that is one step in reverese engineering..
Isn't this good to know for everyone that wants to be computer security savvy?
You had better explain what this has to do with Computer security..
If your were asking how to findout what XYZ virus does when it installed. to learn how to remove it .. well we may have been a little more helpful
I am not talking. Reverse engineering.
Why does this have to be such a technical argument.
Wrong.. I think you will find the argument is Legal..
"Consumer technology now exceeds the average persons ability to comprehend how to use it..give up hope of them being able to understand how it works." - Me http://www.cybercrypt.co.nr
-
September 3rd, 2006, 09:43 AM
#15
Member
might as well delete this thread... I am embarassed to look at it. As I should be for asking such a stupid question... Thanks for making me see the light.
-
September 3rd, 2006, 09:57 AM
#16
I do not wish to crack the program
From what you have said earlier that is exactly what you are proposing to do.
I already "own" the rights to running the program at its current state
No! you do not. You (may) have been granted a licence to use the program in accordance with the terms and conditions of its EULA. It would not be protected by armadillo otherwise. Any attempt to circumvent the normal installation process, and functionality is a violation.
I was just looking for a program that tells you exactly what the installer does
That is reverse engineering. At best you will find out what has been installed. Google for the tools to do that, you will probably need one for the system and one for the registry.
Isn't this good to know for everyone that wants to be computer security savvy?
No, it is irrelevant. If you are security savvy you only install software that you trust, and you are only interested in what has been installed and what it does.
-
September 3rd, 2006, 12:04 PM
#17
Member
http://www.prismmicrosys.com/install...itor-index.htm
http://www.devhood.com/tools/tool_de...px?tool_id=432
Here are two programs I found if you anyone was interested. I know some of us probably download stuff from other than microsoft or sourceforge..
I was just looking for a more forward answer..someone speaking from experience..but I do understand what kind of forum this is so I apoligize in trying to make an accomplice to any EULA violations..
-
September 3rd, 2006, 02:38 PM
#18
Hi
I was just looking for a program that tells you exactly what the installer does
If you want to know what actually gets installed (inclusively registry entries),
use installwatch[1]. If you want to understand what the program is accessing while
running use filemon[2], regmon[3] and maybe process explorer[4]; and have a look at
this tutorial[5] for a general guideline to forensic analysis.
I see that you have found two other monitoring programs. Would you mind
sharing your experience, once you performed some tests?
Cheers
[1] http://www.epsilonsquared.com/installwatch.htm
[2] http://www.sysinternals.com/Utilities/Filemon.html
[3] http://www.sysinternals.com/Utilities/regmon.html
[4] http://www.sysinternals.com/Utilitie...sexplorer.html
[5] http://www.antionline.com/showthread...hreadid=272469
If the only tool you have is a hammer, you tend to see every problem as a nail.
(Abraham Maslow, Psychologist, 1908-70)
-
September 3rd, 2006, 07:08 PM
#19
that it is someone else's intellectual property, and what you are proposing is illegal.
WTF, are you some kind of vigilante for software companies?
That's a little harsh. If I edit my registry to remove spyware
am I guilty of IP violations because I want to know how they
managed to install it in the first place?
Did you know that if a stream flows through my land, I cannot
arbitrarily dam it up and prevent the water from flowing
downstream to others? Some things resist being categorized
as property
http://www.fsf.org/
I came in to the world with nothing. I still have most of it.
-
September 3rd, 2006, 08:07 PM
#20
rcgreen I shall be charitable and assume that you have been drinking.
WTF, are you some kind of vigilante for software companies?
No, but I do have to consider my responsibilites towards JupiterMedia. The rules of this site are clearly stated on the front page.............you really should know that by now?
If I edit my registry to remove spyware, am I guilty of IP violations because I want to know how they managed to install it in the first place?
WTF? How is that remotely related to someone wanting to take proprietary software, modify it to "make it mobile" and run it on a machine that he admits that he doesn't have permission to install software on anyway??????????????? The only bloody reason he wants to know this is to achieve that objective.............the guy has all the makings of an "ex-employee, soon to be unemployable"........... we do have a certain responsibility towards these "overenthusiastic individuals" IMO.......... we need to dissuade them from lines of experimentation that will clearly get them into trouble?
Some things resist being categorized
Legally owned and copyrighted intellectual property, covered by a clearly stated EULA is not one of those things ..................... particularly when it is protected by a system such as Armadillo.
Get a life folks, this is NOT a skiddie cracking site
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|