Utilizing Reverse Engineering in Tracking Software to diagnose its weaknesses
Abstract
In this research, Video Cutter Software was analyzed and that software uses a well known protection method called "User Name and Registration Number". This software uses kind of complicated key generating algorithm. The analyzer hits upon the protection routine of interested software and adds suitable code to them. In other words, he discovers where in memory the entering data is stored and then to find out what is done with it. In this research, a merge technique was adopted between code injection and key generation i.e. (code is added to the execution file) in order to make the software itself browse message that contains registration number and this is in turn would consume less time than expected in analyzing (for key generation algorithm). Also, this research discusses how to support software protection by using anti-reverse engineering techniques to prevent crackers from license code stealing.