"A plaintext file requires a special tool, called a text editor, to change its content."
"I recommend notepad.exe or pico. Linux hackers may use WINE to run notepad.exe." [rofl]
EDIT: I think it's just the author's sense of humor, not actually satire.
Jar files are complex. So complex, a major conference carried a talk on how to reverse engineer them in early 2012.
Except his attack is valid against all unsigned binaries... even his own. He could be distributing a backdoor and not even be aware of it...
I wrote this post to show how to use my software to backdoor a pirated copy of my software.
https://www.google.com/#q=phishing&tbm=nws
(1a) Statements, such as "it requires social engineering" [it's not a valid vector] represent a dated understanding of hacker tactics and part of my work is to help folks with your view move their understanding forward. Usually the conversation is not a response to an adversarial comment like yours.
Here are a few talks/papers that I recommend:
http://blog.strategiccyber.com/2012/12/19/hacking-like-apt/
(2) Cobalt Strike builds on something called the Metasploit Framework. The Metasploit Framework is the largest open source collection of safe exploits. My product addresses gaps in this kit for executing attacks that mimic those high profile intrusions mentioned a moment ago. A successful operation requires more than an email with something bad attached.
http://blog.strategiccyber.com/2013/01/14/tactics-to-hack-an...
(2a) Cobalt Strike's open source little sister is Armitage. A popular user interface and collaboration tool for the aforementioned "better and powerful and safer open source alternative to run exploits". I'm the developer of Armitage as well.
I'd love to hear what these better, more powerful, safer open source alternatives are though.
"The cracked versions are backdoored! Use official release to be safe."
On a side note I am amazed that more developers do not sign their own code with checksums and alteration verification routines. Sign your software, then do a runtime check if the code has been altered. If so, after few hours of use, present the user with a nice message:
"Congratulations, you have a cracked copy of our software. We find it sad that you did not want to buy it from us. It's possible that we may starve as a result. In any case, we would like you to stop using this copy. To encourage you to do so we are going to begin now uploading the contents of your hard drive to our servers. You may stop this process at any time by closing the program and removing it from your computer. Thank you."
A non-game example off the top of my head is Milkshape 3d, a basic modelling software that was popular in the early 00s because it had importers and exporters for the games that were wildly popular then such as Counter-Strike.
The teenagers using it had no money to pay for the full version, so cracking of it was rife. Eventually the "anti-piracy" mechanisms built into it by the author got crazy enough that the program was essentially broken.
I can't really remember specifics, except that it crashed your computer (!) if you tried to use a certain app-sniffing software.
People tend to only add in the protection at the last minute; rather than making it an integral part of the code.
I only ever came up against a few programs that I couldn't hack. It genuinely became easier when people would use an off-the-shelf "protect my program" toolkit; crack one and you'd cracked all programs using that family of protection.
It was rare that I couldn't register demo/eval copies of programs. Sure I know assembly, and used SoftIce, but we're talking about a random guy in his late teens/early twenties who mostly learned by trial and error with random hints from +fravia.
(ObRandom: I know it must be a pain as a developer, but the best way to stop people cracking your demo is literally to have two binaries. Genuinely don't compile "file:save" or whatever feature you're keeping for paid users, into your demo version. Sure this will stop instant registration, and it won't stop somebody from leaking a full version, but it will absolutely stop the majority of attacks.)
I have done that but I'm not sure it's really the best way. My stats are very far from being statistically significant but I'd say this type of protection has increased the fraudulent (stolen credit card) orders about tenfold for me. Which means that if I don't catch it on time I'm hit with $15 chargeback fee. It's really frustrating because I've deliberately made the trial version very easy to crack. I have no problems with cracked copies floating around, I just didn't want serial codes being freely available.
Putting yourself in a difficult legal position on top of it helps no one.
Cobalt Strike isn't exactly a $100 copy of Office - potential users who are going to use it to its full extent are going to be willing to pay the steep cost of entry as it is.
In other words, while it would be possible to guard against piracy, the end result wouldn't be more sales of Cobalt Strike.
No back-dialing, ever. Basically they do not want the company to have a remote-switch to disable the software after they've buyed it, do not want the risk to not be able to play a game anymore just because a company decided to put down the servers and want to be able to play everywhere without an internet connection (e.g. I sit at my laptop and cannot play your singleplayer game because you decided to need dial-back? No chance.)
The other camp doesn't care about it, more or less. Sure, they would like it if there was no dial-back for the games, but it doesn't hinder them from still buying and playing at platforms/games that require this as long as their playing experience isn't dimished by it. Steam is more or less the platform of choice for the second camp and seems to be growing all the time, so most users probably would acccept an dial-back connection once, every 30 days or even at every start. Quick note: Always-On is still something which is considered off-limits. Ubisoft tried it various times with their games and fell flat on the face. They've backpaddled to activate once by now.
The result in the end then becomes that pirates will still use the software, but people without a stable Internet connection can't use your software.
It also ads a problem for businesses. Suddenly, they need to poke holes into VPN's, and risk that the software will also become unusable if their Internet connection ever become a problem (lets hope they don't plan to draw fiber). The millions of military personal will also be unlikely customers, as their Internet connectivity in the field is not know for it up-time.
I hope this is satire. "The unzip tool uses a sophisticated algorithm based on LZ77 and Huffman coding". Oh wow. Who would have thought. " These files do not represent the socio-economic status of the code." Oh.
Lame humor.
Snarking about why he's root when he runs unzip does not advance the discussion and despite your efforts, it does not make you look smarter than him.
If anything, Im critizing his writing style, the blog article is not fun to read as it comes from a presumptions and arrogant/entitled position.
Or maybe its just me I dont see anything funny in that article, I just dont find the poking at virtual Linux users and people interested in cracking from a position of authority funny.
Effectively the entire article is making fun of hackers, people who are curious how to break software and make it do unspecified things, people who dare poke and dare crack. But its his software, so it is ok for him to make fun of others right?
The cracking culture is many peoples first step into hacking and programming, we wouldnt be here if all of us really payed for the stuff we used as kids.
Kali is a distribution with a focus on offensive security. Most tools require root to run. It's very rare to find a Kali user who uses sudo and works from a non-root account. root for all actions is normal.
Some people may use Kali day to day, but it's built to do a job.
I didn't call out Kali specifically, but all of my screenshots show Kali's default window manager theme. I don't know if my audience earns the "hacker" badge by your standards... but I suspect most of them recognize Kali from a distance.