@piracy How do i check if a crack is safe or not?
fedilink

@piracy How do i check if a crack is safe or not?

I’m trying to install a cracked version of davinci resolve on my pc, but I don’t know if it’s safe. is there a way to check easily?

#linux #help

@ColdWater@lemmy.ca
link
fedilink
English
010M

I never used Linux before, is virus still a problem for cracked software on Linux?

@TheOSINTguy@sh.itjust.works
link
fedilink
English
0
edit-2
10M

Typically, malware is harder to run on linux due the system asking for a sudo password for anything that requires administrator privlages. There are also plenty of other factors that i dont feel like getting into

Not to also mention most malicous applications are designed for windows, not linux.

@themelm@sh.itjust.works
link
fedilink
English
110M

Its mainly the market share thing really. Using good default policies on windows or Linux would kill a lot of malware but typical Linux users still just copy paste shit into the command line and add random repositories etc anyways. And a program running with my privileges in my home directory would be 99% as bad as it running as root since my machines are really just me using them.

KillingTimeItself
link
fedilink
English
110M

your main concern would be files. If you run something as your usual suspect user, that software can do pretty much whatever it feels like with files under those permissions, unless sandboxed.

Not quite malware, but if someone wanted to troll you a goof rm -rf isn’t hard.

  1. Scan it with AV. This might still product false positives, so understand the difference between viruses and PUPs.
  2. Go with keygens if at all possible. Run them in a sandbox, like sandboxie-plus.
  3. Only download cracks from trusted sites, and from trusted scene groups.
  4. Preferably check the crack with a MD5 or CRC, so you know its not been tampered with.

Test strips. PSA: Everyone should test their drugs and carry narcan.

@bionicjoey@lemmy.ca
link
fedilink
English
210M

I was gonna say “have someone else smoke it first”

@Maxy@lemmy.blahaj.zone
link
fedilink
English
110M

If the installer is small enough (<650MB I believe), you can upload it to virustotal.com to have it be scanned by ~65 antivirus programs

@MalReynolds@slrpnk.net
link
fedilink
English
310M

If it’s suss use a vm before your main OS.

ddh
link
fedilink
English
110M

And start with no network for the VM

Fracture
link
fedilink
English
410M

This is a good idea and a good practice in my opinion. Some malicious code detects when it’s being sandboxed and hides itself until it’s running somewhere it can do damage though.

Once malware is VM aware it can also get outside a VM. Furthermore, malware can be written to seat itself comfortably in your PC and lay low for hours, days, weeks before becoming active. Installing in a VM and waiting for shit to hit the fan is not always reliable.

@bamboo@lemm.ee
link
fedilink
English
110M

Getting out of a VM reliably is not usually trivial, and VM escapes are usually designed to target specific configurations rather than an arbitrary deployment. A VM with a minimum amount of shared resources is usually a reasonable security boundary unless you think the malware you’re analyzing has hypervisor-specific 0 days.

@ccdfa@lemm.ee
link
fedilink
English
110M

Isn’t DaVinci resolve free?

Millions :biflag:
creator
link
fedilink
010M

@ccdfa yeah but h264/mp4 exports are paid only from what I heard

@GerPrimus@feddit.de
link
fedilink
English
110M

export it as some QuickTime/mov/whatever and recode it with handbrake.

@Kissaki@feddit.de
link
fedilink
English
110M

A crack changes program code and is executed. There is no easy way to check if it is safe.

Unless you inspect the source code or binary code (directly or through reverse-engineering) you can not verify it.

What’s left without that is attempts at gaining confidence through analysis trust of third parties - the providers, distributors, creators - who have to be confirmed beyond a matching text label too.

The alternative to or extension of being confidently safe or accepting the risk is to sandbox the execution. Run the crack in a restricted environment with limited access in case it does things you do not want to. Optionally monitoring what it does. Which has to be put into relation of what the program does without the crack.

Back when I used cracks often the cracks were small keygens and sometimes a patched main exe/dll, so I could just generate the key in a vm/sandboxed environment and inspect the patched binary, usually they did nothing weird. Huge repacks are often very sketchy though… Nowadays there are many great FOSS alternatives so I tend to use them more.

@kusivittula@sopuli.xyz
link
fedilink
English
-110M

first visual inspection: is there any rash or poop or anything nasty in there? then sniff.

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ
!piracy@lemmy.dbzer0.com
Create a post
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don’t request invites, trade, sell, or self-promote

3. Don’t request or link to specific pirated titles, including DMs

4. Don’t submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

  • 1 user online
  • 106 users / day
  • 270 users / week
  • 1K users / month
  • 3.5K users / 6 months
  • 1 subscriber
  • 3.4K Posts
  • 82.2K Comments
  • Modlog