1 00:00:00,810 --> 00:00:07,080 Hello, viewers, and welcome back to another great day, and we are going to learn something different 2 00:00:07,080 --> 00:00:21,250 today as we learned about the introduction to as 64 GBG and I've decided that it's easy. 3 00:00:21,750 --> 00:00:33,540 So today we're going to learn lesson three, which is I listen to right here, setting up your workspace 4 00:00:33,720 --> 00:00:34,550 and workflow. 5 00:00:34,920 --> 00:00:38,290 That is where today we are going to concentrate on. 6 00:00:38,670 --> 00:00:46,060 So I saw last year, so we just did the introduction to you where I showed you how to download the applications. 7 00:00:46,530 --> 00:00:49,020 And today I'm going to show you how to restore them. 8 00:00:49,110 --> 00:00:54,170 And when you face some problem, how to search and try to solve that issue. 9 00:00:54,630 --> 00:00:56,490 So without wasting my time. 10 00:00:56,850 --> 00:00:57,930 Let's get started. 11 00:00:59,540 --> 00:01:06,990 So back to today's story as I show you are going to set them up, your workspace will wait for you. 12 00:01:07,190 --> 00:01:12,760 So I minimize this, then we head straight to our Windows system. 13 00:01:12,770 --> 00:01:19,190 I told you, we are going to use our Windows operating system because it's largely used by people. 14 00:01:19,460 --> 00:01:21,670 And that is what this is. 15 00:01:21,680 --> 00:01:27,800 The key piece is default was made for the classes on open source and open source. 16 00:01:27,800 --> 00:01:28,580 Mint is free. 17 00:01:28,610 --> 00:01:31,460 You can download it when it's paid. 18 00:01:31,460 --> 00:01:35,030 Rachet Mukasey to not be an open source anymore. 19 00:01:35,030 --> 00:01:40,180 You'll be seeing apprising here, waiting to start to buy or purchase the application of the software. 20 00:01:40,610 --> 00:01:46,700 By this time, the program is ready to open open source, which means everybody is hoping to source 21 00:01:47,180 --> 00:01:50,120 out of this program and use it on its own. 22 00:01:51,350 --> 00:01:58,370 Yes, that will follow the same condition and the application, not message to Windows. 23 00:01:59,240 --> 00:02:02,270 And this is where we're using I'm using the same. 24 00:02:02,270 --> 00:02:05,060 You can use Windows eight and type of windows. 25 00:02:05,410 --> 00:02:07,880 You are familiar with depression. 26 00:02:07,880 --> 00:02:11,000 You can buy me using Windows seven for the stewardess. 27 00:02:11,570 --> 00:02:13,250 So let me switch to my windows. 28 00:02:14,240 --> 00:02:14,460 Okay. 29 00:02:14,570 --> 00:02:16,190 I have my boss, Landseer. 30 00:02:19,020 --> 00:02:22,200 You may be a victim of the software counterfeiting. 31 00:02:22,980 --> 00:02:28,650 Uh, I'm not counterfeiting any of your programming. 32 00:02:28,680 --> 00:02:34,160 Yes, a great your box application, which is running Windows seven. 33 00:02:34,290 --> 00:02:34,620 Right. 34 00:02:35,100 --> 00:02:39,360 And you try to maximize it so that we get into dictatorial behavior. 35 00:02:39,600 --> 00:02:40,740 And I'll show you some stuff. 36 00:02:41,350 --> 00:02:42,880 I don't know why. 37 00:02:42,970 --> 00:02:45,240 Stops trying to 38 00:02:49,060 --> 00:02:50,230 make you happy. 39 00:02:51,470 --> 00:02:54,390 I think the issue is moot or. 40 00:02:56,460 --> 00:02:57,750 Wait, what is happening? 41 00:02:58,560 --> 00:03:08,000 OK, let me try to my mind, I know I kind of switch and boom and perfect. 42 00:03:08,010 --> 00:03:10,060 This is what I was looking for on this one. 43 00:03:10,320 --> 00:03:12,440 So what were you going to do today? 44 00:03:12,840 --> 00:03:13,650 Installation. 45 00:03:13,650 --> 00:03:13,900 Right. 46 00:03:14,100 --> 00:03:17,170 So I have my folder here on my Windows seven. 47 00:03:17,170 --> 00:03:21,420 Next up, it's about a software. 48 00:03:23,150 --> 00:03:32,750 Software cracking tools, so these are the tools you're going to use and crack, and these are applications 49 00:03:32,750 --> 00:03:35,180 and software along the route now. 50 00:03:35,610 --> 00:03:45,440 And these four that I have that you see, I downloaded to 50 EIU, Windows 32 and 64, and there is 51 00:03:45,440 --> 00:03:47,030 one domain you'll be using. 52 00:03:47,270 --> 00:03:49,670 Our next lesson is the application. 53 00:03:50,000 --> 00:03:54,680 I will leave that in the link below Indianness lessons that I can download. 54 00:03:54,680 --> 00:03:55,790 So you practice a lot. 55 00:03:55,850 --> 00:03:56,930 So it is our software. 56 00:03:56,930 --> 00:03:58,170 We are going to practice it. 57 00:03:58,270 --> 00:04:06,050 The first one is American to us, made by a white programmer and we are going to see how to crack that 58 00:04:06,620 --> 00:04:07,190 software. 59 00:04:08,510 --> 00:04:16,230 And this outrageous economy that you're going this is that we did graphical user interface aggression 60 00:04:16,700 --> 00:04:21,680 and this is a command line version which is running DOS. 61 00:04:22,220 --> 00:04:24,200 Oh, Windows, yeah. 62 00:04:24,200 --> 00:04:25,130 Windows Dalziell. 63 00:04:26,300 --> 00:04:30,680 So this is command line and this is a graphical user interface. 64 00:04:30,710 --> 00:04:33,700 You're going to learn how to produce application. 65 00:04:36,210 --> 00:04:43,310 And the first thing I'm going to do is to hoping while you download and all this exit gibi, you download 66 00:04:43,310 --> 00:04:44,840 and you see something like a snapshot. 67 00:04:45,930 --> 00:04:48,730 I have it here, I said zip and I started it. 68 00:04:49,050 --> 00:04:53,260 So when you open it, you just open a release. 69 00:04:53,290 --> 00:04:58,130 OK, then after you open release, you step program. 70 00:04:58,620 --> 00:05:02,280 Know, the first time you land a program, you're going to face some errors. 71 00:05:02,280 --> 00:05:08,400 When your windows is a new operating system be installed, your machine now going to face an error like 72 00:05:08,550 --> 00:05:09,130 this. 73 00:05:09,150 --> 00:05:11,220 Let me show you the arrow now pop up. 74 00:05:13,710 --> 00:05:22,020 You're going to face this error, which is the program can't start because API aim to win control runtime 75 00:05:22,170 --> 00:05:24,850 one two one zero DL is missing. 76 00:05:25,320 --> 00:05:34,560 So when this is done, all you need to do is to copy all these error you face and put it in Google so 77 00:05:34,560 --> 00:05:39,600 you can't just copy and go to Google Open and you type. 78 00:05:43,140 --> 00:05:43,920 Trochu. 79 00:05:47,940 --> 00:05:49,620 Google, apparently stammerer. 80 00:05:51,520 --> 00:05:54,100 And on slow Internet, Poppy. 81 00:05:55,340 --> 00:06:04,660 OK, so now you can paste the error here and boom, you see this first link, I just up with the wiki, 82 00:06:04,670 --> 00:06:09,320 a tax document, it is going to show you the process to solve that issue. 83 00:06:09,710 --> 00:06:15,590 So it is going to allow you to download some application to be stored in windows so they be able to 84 00:06:15,590 --> 00:06:17,630 run the hot application. 85 00:06:18,080 --> 00:06:19,300 So I've already done that. 86 00:06:19,460 --> 00:06:20,550 So my own problems. 87 00:06:20,550 --> 00:06:26,480 So you two can just do what I just did and try to solve the problem and continue from day. 88 00:06:27,020 --> 00:06:30,290 So this is what you're going to see. 89 00:06:30,290 --> 00:06:41,810 That is as CBG, because I'm running on 32 bit OS that is in the same 32 bit OS. 90 00:06:42,620 --> 00:06:55,610 If we see the ECB 64 I it running put recently to ABCL 64 bit to change the system for I show you to 91 00:06:56,960 --> 00:06:57,790 installation. 92 00:06:57,800 --> 00:07:00,440 So I have my here setup. 93 00:07:00,470 --> 00:07:04,610 Oh you can't just run your phone it for the way you instructed from now on is working. 94 00:07:04,940 --> 00:07:11,290 And the second one, as I told you, would you chose to detect is design. 95 00:07:11,360 --> 00:07:19,260 That is by also around that iteration which I've made a shortcut on my desktop so I can go to English, 96 00:07:19,260 --> 00:07:22,060 started to portable. 97 00:07:23,090 --> 00:07:24,750 This is the application. 98 00:07:24,770 --> 00:07:27,470 I've moved it to the desktop to create a shortcut. 99 00:07:28,730 --> 00:07:29,750 It's as simple as that. 100 00:07:29,780 --> 00:07:31,030 So what are you going to do? 101 00:07:31,040 --> 00:07:31,540 Lists. 102 00:07:32,390 --> 00:07:38,480 Let me open the application because today I want to look at the environment of this all application 103 00:07:38,480 --> 00:07:41,520 and what and what each and every one does. 104 00:07:41,540 --> 00:07:49,220 OK, so first let me open this to application and then open this one first 105 00:07:51,870 --> 00:07:54,170 and wait for some time. 106 00:07:54,170 --> 00:07:55,280 It'll get open. 107 00:07:56,850 --> 00:08:00,160 And we can also launch this one to you. 108 00:08:07,400 --> 00:08:14,150 Next week, for a while before the dam will open, I think one of the sovereignty. 109 00:08:19,080 --> 00:08:22,400 So as 32 to TVG. 110 00:08:23,380 --> 00:08:25,000 Or assisted for DP. 111 00:08:26,370 --> 00:08:27,980 That's already been announced. 112 00:08:30,420 --> 00:08:42,600 I'm still waiting for the V.A. to be open if effort that started working so they're not trying to perfect 113 00:08:43,120 --> 00:08:44,610 it's not responded by to respond. 114 00:08:44,680 --> 00:08:50,000 You know, this is the interface of the IG. 115 00:08:52,350 --> 00:08:52,800 OK. 116 00:08:53,710 --> 00:08:54,400 Dr.. 117 00:08:58,460 --> 00:09:05,540 This is the interface of I know I'm going to do something for you to see, you can see here Debbie's 118 00:09:05,540 --> 00:09:06,130 address. 119 00:09:06,790 --> 00:09:10,750 Any time a program is run, it's always run into a memory. 120 00:09:11,210 --> 00:09:21,200 So when you went to Catholic school first, you need to know the address and also the base address with 121 00:09:21,200 --> 00:09:28,400 this base base, you can calculate for the entry point, which I'm going to show you that in our next 122 00:09:28,400 --> 00:09:28,810 lesson. 123 00:09:29,300 --> 00:09:36,980 So any time you load a programming application in, this detective is going to show you its best address, 124 00:09:37,670 --> 00:09:45,110 which is the base in which this application, anytime you download the program from the Internet, you 125 00:09:45,110 --> 00:09:46,340 run it on your machine. 126 00:09:46,970 --> 00:09:50,480 This program goes into memory for it to be temporary use. 127 00:09:50,480 --> 00:09:54,560 Or you see, sometimes when you launch on Microsoft, operate like wite. 128 00:09:55,160 --> 00:09:57,790 After some time, you just use it and it's your window. 129 00:09:58,180 --> 00:10:05,670 So the moment to launch this Microsoft operating system, it goes into memory, computer memory wise, 130 00:10:05,740 --> 00:10:07,160 which is Verizon Wireless. 131 00:10:07,160 --> 00:10:12,650 And some calls for that to be able to process your program, for it to be displayed on the screen for 132 00:10:12,650 --> 00:10:13,250 you to use. 133 00:10:13,520 --> 00:10:19,580 So it is bizarre based on this bizarre address you can calculate for our entry point. 134 00:10:19,730 --> 00:10:26,200 And that is where one, you know, the entry point of any application, that is where you start hacking 135 00:10:26,480 --> 00:10:28,590 the software or any application. 136 00:10:28,790 --> 00:10:30,800 So this is the base. 137 00:10:30,800 --> 00:10:37,730 I guess you have the entry here and we're not seeing some windows here, which I'm going to show you 138 00:10:37,730 --> 00:10:39,130 in the next one. 139 00:10:39,140 --> 00:10:43,810 I import one of application to the software. 140 00:10:44,060 --> 00:10:52,580 I'm going to show you what it means because maybe you going to do depth analysis on that program to 141 00:10:52,580 --> 00:10:55,310 be able to detect or calculate for entry point. 142 00:10:55,610 --> 00:11:00,200 And you match that entry point to the entry point. 143 00:11:00,200 --> 00:11:08,900 And this software, which is a city beach or a to you because I'm using that to beat operating system, 144 00:11:08,900 --> 00:11:10,920 is open to debate. 145 00:11:11,420 --> 00:11:20,000 So what we're going to do is after we follow the entry point, we will also check for the entry point 146 00:11:20,000 --> 00:11:26,460 in this application and we start cracking the application in this software. 147 00:11:26,480 --> 00:11:30,800 So this is the main application for tracking the software. 148 00:11:30,800 --> 00:11:37,020 And this is kind of a backup for you to do an analysis of the software before you bring it here to do 149 00:11:37,020 --> 00:11:37,250 it. 150 00:11:37,330 --> 00:11:41,740 What all the tracking process of the application. 151 00:11:42,080 --> 00:11:43,400 So what are you going to do? 152 00:11:43,400 --> 00:11:45,320 His homework to explain some time here. 153 00:11:46,280 --> 00:11:49,460 So here is always the graphical user interface. 154 00:11:49,460 --> 00:11:54,260 Espina and Balochi user interface of the application. 155 00:11:55,180 --> 00:12:07,010 You see Wal-Mart what there on this panel will always show you acquired some memory addresses and which 156 00:12:07,550 --> 00:12:09,260 in the application one is fine. 157 00:12:09,260 --> 00:12:11,880 It goes into the public domain, as I show you. 158 00:12:11,900 --> 00:12:19,220 So it displaces a panel for memory addresses that is assigned to this application and what it finds 159 00:12:19,220 --> 00:12:23,410 to when an application is for an operating system. 160 00:12:23,720 --> 00:12:29,180 I don't see what we put off code for the machine court, as I told you. 161 00:12:29,660 --> 00:12:32,860 So it always reads once and derivs in binary. 162 00:12:33,010 --> 00:12:40,050 OK, so all the calls you are going to see here to being once in zero, but it will be written by a 163 00:12:40,110 --> 00:12:40,920 Hasidism. 164 00:12:41,330 --> 00:12:45,610 OK, to me, one zero one zero one zero zero. 165 00:12:45,710 --> 00:12:49,960 It will always contract itself to what has had the decimal point. 166 00:12:49,970 --> 00:13:01,130 So they should be able to know what is happening a year before the assembly, which is the human language 167 00:13:01,250 --> 00:13:02,630 development code where. 168 00:13:04,040 --> 00:13:05,900 Instead of the competing. 169 00:13:06,850 --> 00:13:12,590 Popping up with talked once in 05 because we might be going to start Wednesday, signed up and put out 170 00:13:13,060 --> 00:13:17,140 an application and it's been one of the very few wouldn't know what it means. 171 00:13:17,590 --> 00:13:26,790 So it was everything being it was as if one could as much input as we as humans here would to recognize 172 00:13:26,800 --> 00:13:29,440 we can't rely to your software. 173 00:13:29,920 --> 00:13:35,350 All those outlets, including which one is being called red tape, as I told you, it doesn't have to 174 00:13:35,350 --> 00:13:36,730 be assembled. 175 00:13:37,240 --> 00:13:39,630 Yeah, that may be able to be a yes. 176 00:13:39,670 --> 00:13:42,840 The comments got us through these comments. 177 00:13:42,910 --> 00:13:43,300 Yeah. 178 00:13:43,300 --> 00:13:50,200 You could see that any time you run an application, you actually are using a trial period or your software 179 00:13:50,200 --> 00:13:51,370 has been expired. 180 00:13:51,820 --> 00:13:55,810 And a whole lot of you go, you launch one application, I'll show you more. 181 00:13:56,110 --> 00:13:58,440 And these places where the registry is. 182 00:13:58,510 --> 00:14:01,990 So anytime you run application, it goes into the computer registry. 183 00:14:02,380 --> 00:14:04,630 I mean, this I just read this to you. 184 00:14:04,630 --> 00:14:14,080 I want to see some the be a whole lot of code, which I'm going to explain in upcoming license for you 185 00:14:14,080 --> 00:14:16,500 to know what they to for. 186 00:14:17,650 --> 00:14:24,060 And here you be running here will be something that it's not as kind of a compendium mentality where 187 00:14:24,070 --> 00:14:31,180 where anytime time is kind of a supporting staff to this registry, where by this place, the stacks 188 00:14:31,210 --> 00:14:35,710 always changes when the program is run and it keeps changing that. 189 00:14:36,160 --> 00:14:38,620 It's not a static dynamic stack. 190 00:14:38,800 --> 00:14:40,270 So it keeps on changing. 191 00:14:40,450 --> 00:14:46,870 OK, so actually this is all you need to know about this application. 192 00:14:46,890 --> 00:14:47,590 So here. 193 00:14:47,590 --> 00:14:56,850 Yes, the times where you could see the stub series, see program the program, run a program, pass 194 00:14:56,890 --> 00:14:58,050 a program, you see. 195 00:14:58,060 --> 00:15:05,500 Oh, this one would be some of them is late for you to understand them in depth or form you're going 196 00:15:05,500 --> 00:15:06,880 to do throughout this course. 197 00:15:07,210 --> 00:15:21,550 So this actually brings us to the second lesson that is setting up your what space and what floor. 198 00:15:21,700 --> 00:15:27,420 So looking at all these, you see that you'd be able to do a whole lot of stuff. 199 00:15:27,850 --> 00:15:29,020 And I think. 200 00:15:31,390 --> 00:15:39,970 It will be a nice start for you that, you know, to be able to get lost, but always remember any time 201 00:15:39,970 --> 00:15:48,570 you run your application back to A or B and you find out who it is, error, or you need to do it, 202 00:15:48,650 --> 00:15:51,760 send it to Google, go for it and look at the steps. 203 00:15:52,300 --> 00:15:53,700 I know how to solve it. 204 00:15:53,710 --> 00:16:03,480 I know you're going to download something quite impressive software snideness, which is very sure Siri 205 00:16:03,490 --> 00:16:04,180 redistribute. 206 00:16:04,210 --> 00:16:05,410 Let me show you the name here. 207 00:16:05,830 --> 00:16:10,540 It's called the twenty seventeen Microsoft, Vishwa, C++. 208 00:16:10,990 --> 00:16:12,190 You need to download that one. 209 00:16:12,190 --> 00:16:19,600 And I think this one is 2015, 2016, 2017 and install it. 210 00:16:19,600 --> 00:16:24,460 And I think there will be going to be able to run your application and you along with this program. 211 00:16:24,670 --> 00:16:28,510 And in the next hour I'm going to share a link for this crack. 212 00:16:28,510 --> 00:16:35,770 Me and I had my name in step in because that is what we are going to do, internationalising to show 213 00:16:35,770 --> 00:16:44,490 you how or the software side, you know, how it was programmed to youth programs. 214 00:16:44,500 --> 00:16:49,540 They used to link the application, you know, the piece of software, the software, and also know 215 00:16:49,570 --> 00:16:55,420 how to calculate what the entry point of any application would be to crack that software. 216 00:16:55,630 --> 00:17:03,000 OK, so this brings us to the end of setting up our working space and the environment for cracking. 217 00:17:03,370 --> 00:17:10,060 I hope you enjoyed this tutorial and see the where you are going to learn iboga, which is this one. 218 00:17:10,270 --> 00:17:14,490 I mean, dissembler got basics. 219 00:17:14,500 --> 00:17:15,820 I want to show the basics. 220 00:17:16,030 --> 00:17:21,460 So we'll be launching the application to dictate, i.e. to show some information before we round up. 221 00:17:21,460 --> 00:17:29,740 Application is 52 devices to four to know what is happening in the background of any time an application 222 00:17:29,740 --> 00:17:30,100 run. 223 00:17:30,100 --> 00:17:36,690 And from there we start doing some great stuff and we start tracking soft toys. 224 00:17:37,090 --> 00:17:41,530 I like for you to see what is happening, so enjoy your day. 225 00:17:41,560 --> 00:17:44,380 Take care and stay safe. 226 00:17:45,070 --> 00:17:45,640 Goodbye. 227 00:17:45,820 --> 00:17:47,500 I'm still going to look tonight. 228 00:17:47,500 --> 00:17:49,270 I'm going to make sure you take care.