Hacking Tutorials's journal picture

Hacking Tutorials

followFollow
🤴
Administrator: DrWatson
🕒
Created 10 Jun 2018
📄
54 Articles

Collection of Hacking Tutorials

A tutorial on different approaches to cracking

DrWatson's profile picture
Published in 
 · 27 Feb 2023
.oOOo. A Tutorial On Different Approaches To Cracking - TekFacts95 v1.40.4 (8/04/97) .oOOo. .oOOo..oOOo..oOOo. by tHATDUDE [PC & GLoW] .oOOo..oOOo..oOOo. Program Stats: What it is: A system util to check CPU usage, etc. Where to get: http://ourworld.compuserve.com/homepages/deansoft or http://www.winutils.com/ Size: 583kb (zipped) Protection: Start-up NaG, Delay, "unregistered" text in several places, Name/Code entry Tools to crack: W32Dasm v8.9 Hex editor of your choice... OK.. I'll attempt to explain my thought processes while cracking TekFacts... First thing I do before anything: Unzip an...

The Amatuer Crackist Tutorial

DrWatson's profile picture
Published in 
 · 27 Feb 2023
VOL 1 NUM 1 The Amatuer Crackist Tutorial Version 1.3 By Specular Vision Special Thanks to: Mr. Transistor Ironman The Grand Elusion Banzai Buckaroo Another fine PTL Production Call The Myth Inc. BBS Table of Contents i. Table of Contents ii. Introduction I. How to Crack Debugging DOS Cracking on the IBM PC Part 1 Cracking on the IBM PC Part 2 II. Example Cracks Mean-18 by Accolade Submarine by Eypx Space Station Oblivion by Eypx III. Removing Doc Check Questions F-15 Strike Eagle by MicroProse Battlehawks 1945 by Lucasfilms Yeager's AFT by Electronic Arts IV. Cracking Self Booters Disk Basics Victory Road by Data East MS-Flight Simul...

Wik and the Fable of Souls

DrWatson's profile picture
Published in 
 · 12 Aug 2022
Wik and the Fable of Souls
Tutorial by: VegitoSSJ Level: Beginner Written 08-08-2005 What we will do in this lesson is this: Searching our memory Setting an breakpoint Finding an code cave Making the code cave This tutorial will explain how to make an simple Infinite Life hack. Get on with the show;) 1. Searching our memory Well you start with 3 lives so exact value 1 byte, 3. Get back ingame lose an life exact value 1 byte, 2 etc.. Till you have found the right memory value ;) I came up with 2 locations: C711C8 and C711D4 . C711D4 is the right one for me, Let's get going ;) 2. Setting an breakpoint I assume you haven’t closed t-searh yet hehe ;) Press autohack...

A Tutorial On Different Approaches To Cracking - TekFacts95 v1.40.4

DrWatson's profile picture
Published in 
 · 18 Jul 2020
.oOOo. A Tutorial On Different Approaches To Cracking - TekFacts95 v1.40.4 (8/04/97) .oOOo. .oOOo..oOOo..oOOo. by tHATDUDE [PC & GLoW] .oOOo..oOOo..oOOo. Program Stats: What it is: A system util to check CPU usage, etc. Where to get: http://ourworld.compuserve.com/homepages/deansoft or http://www.winutils.com/ Size: 583kb (zipped) Protection: Start-up NaG, Delay, "unregistered" text in several places, Name/Code entry Tools to crack: W32Dasm v8.9 Hex editor of your choice... OK.. I'll attempt to explain my thought processes while cracking TekFacts... First thing I do before anything: Unzip a...

Your first Windoze crack

DrWatson's profile picture
Published in 
 · 18 Jul 2020
MEXELITE '97 PRESENTS "Your first Windoze crack" by YOSHi Introduction There is one recurring thing I see in all cracking tutorials; they are not suitable for the absolute beginner. Either they dont explain what the debugger is doing or they go too fast and skip over sections. With this, I hope to set some people straight on the fundamental issues of cracking Windoze95 programs. By the way if you are somewhat experienced please leave now; you will not learn anything you dont already know. Beginning Ok, the first thing you need to do is download the "target", we will use a horribly limited program called "Hot Chilli 2.0". It is a decen...

Introduction to Win95 Cracking

DrWatson's profile picture
Published in 
 · 18 Jul 2020
A few words before beginning Giving credits, where credit is due ! So, i'd like to give a really BIG thanks to ED!SON of United Cracking Force for his tutorial about Windows 95 cracking, without it i won't be here telling you how to crack a program under win 95. Giving ALL the credits... all i learned about cracking is with the help of great tutorials : 5 Minutes 4 a Crack /NeverOne, Amateur Crackist Tutorial /Specular Vision, Cracking for Masses /FraVia, Old Red Cracker Tutorials /+ORC (A Must), The Ancient Art Of Cracking & Cracking 101 /Buckaroo Banzai, The Cracking Manual /Cyborg, The Uncle Joe Crac...

Hacking the bios

by anand bhaskar

DrWatson's profile picture
Published in 
 · 14 Jul 2020
hey friends, i know hacking with bios is considered lame by the hackers n it indeed is lame but i m sure this gives a good practice at the intial stages n some idea of what the hell it like getting into someone else's computer. the basic limitation of this method is that only shared files can b accessed.however there r ways to hack the not shared one's too but is all i wish too provide u all now.enjoy. introduction 1. Hardware and Firmware 1a. The BIOS The BIOS, short for Basic Input/Output Services, is the control program of the PC. It is responsible for starting up your computer, transferring control of the system to your op...

Assembly for Crackers - v1.0

DrWatson's profile picture
Published in 
 · 14 Jul 2020
Hey, This is a very basic guide to assembly for all those people who couldn't be bothered learning the in's & out's of their computer just to be able to use mIRC without having to click on some guys face. :) I'll basically go through the most necessary stuff that you need to know before you can begin to crack. I know it's not in a very logical order, but what d'ya want for free? ;)) Oh yeah, you should view this with wordwrap on, otherwise it'll be a pain in the arse to follow ;) REGISTERS Registers are basically default places in which to store data. The only ones we need to worry about are: (E)AX, (E)BX,...

ThunderByte Anti-Virus DECRYPTION

DrWatson's profile picture
Published in 
 · 12 Jul 2020
ThunderByte Anti-Virus DECRYPTION
Written by The Poltergeist December 18, 1993 February 06, 1994 This is the documentation belonging to and explaining the use of: ThunderByte Anti-Virus DECRYPTION utility v2.0 TOPICS covered in this document: PURPOSE OF TB-DECRYPT GENERAL INFO HOW TO USE TB-DECRYPT MESSAGES / ERRORS AFTER TB-DECRYPT IS USED INFO ON ENCRYPTION IN TBAV EXECUTABLES PURPOSE OF TB-DECRYPT: TB-DECRYPT is a utility designed to remove the encryption from the executable files included in the ThunderByte Anti-Virus package. It works fine on the files included in release 6.09 of the package, and due to its design, it should work on new releases of TBAV. (Of cour...

HowTo copy a key - quick'n'dirty

DrWatson's profile picture
Published in 
 · 10 Sep 2019
HowTo copy a key - quick'n'dirty
About So, you wanna hack something without a computer? Break into the safe of your little sister, or into a cupboard of your school? Then you are right... I tried this hack today, because i was bored and the internet was down at home. It was pretty easy to make a copy of the key for my little safe out of plastic waste. It should work for other locks too. But now, let us start: What do we need? Scissors or knife Marker Plastic waste The original key Some intelligence & technical understanding The lock, if possible for testing your new key ;) Step 1 Cut out a piece of plastic, it should be a bit bigger than the key. Step 2 Put the key on t...
loading
Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT