"Trusted pirate" isn't an oxymoron, because there is really awesome trusted pirates out there. And those are the people who provided malware free software for years.
Piracy megathread is your best friend, as a student I didn't have money to buy photoshop. Wacatac trojan is the most common false positive with cracks.
and then you get totally valid DLL injectors to get a 20+ year old game to run on modern systems being flagged just because you want it to not crash or run like dogshit because 16/32 bit support died a long time ago and/or you want to run a directX to vulkan translation layer and/or shaders
@@karolstopinski8350Not really. AV/EDR/Sandbox software doesn't check if malware is *actually* bad because it's hard to define what "bad" means. They only look for symptoms and common exploit behaviors. Which is totally what many cracks, trainers, mods, dll injectors do (for legit reasons). AV doesn't know that it's "ethical exploit" doing some kind of exploitation that user expects it to do. Malware detecting systems are simple creatures - they see something "sus", they flag it. You know it's like browser extension that reads your cookies - behavioral AV analysis will say it steals your data. But it may be just some fancy auto-login extension or any other thing that legitimately uses your cookies for good reason. I mean just look at Skyrim SKSE - it totally behaves like full fledged malware lol
Your mentioning of recall made me smile. I don’t think anyone with an inkling of real world security has asked for it, or copilot. Both scare me because of their obvious security risks.
@@leonidas14775 Agreed. I have CP and RC turned off in policy settings using ShutUpWindows10. As a note; the latest features update to win11 turned things back on again that I'd turned off - so be warned that Microsoft will try to be shifty about Recall and Copilot. I don't know why they're trying to ram these things down our collective throats, but it's really making me reconsider using Microsoft products for any daily driver other than gaming.
Everything is a skill, pirating too. You just gotta learn how to do it safey and where are the safe sites. The best thing to do is reading a lot about certain pages security, and never download from sites with tons of shorteners.
@@ShockSmile Short URLs like this.that/123 that takes you to another short.url/456 that takes you to another and another and finally the download page
@@bcj842 yeah those nested shortener sites where you click on one and it brings to another, and another. Sometimes, most of the time, the endgame is not giving you malware but profitting from ads where at the end there's just smoke. Think about it, if they want to infect you with malware it'd be counterproductive to make it harder for you to download the file.
Its more like trusted uploaders vs pirates, its a way to tell folks this user has uploaded for years malware free software. Its not a guarantee its a summary of their history on the platform. Even than folks still check for themselves, pirates value good security software too. If someone has years of documented work uploading clean software, the upload is a few weeks old, and major antivirus software say its safe (along with virus total) it's reasonally safe software. Its really not that complicated, the first rule is to trust no one. Even than it doesn't mean "trusted" uploaders are safe, it's just a proven track record vs some random uploaded you have never heard of.
One thing you have very wrong is "and major antivirus software say its safe" that has nothing to do with how safe a program is. Good hackers know how to make malware fully undetected.
FOR games it is safe if you download from trusted uploaders. That is why this guy uses a software. Hackers will not bother to waste time building reputation and stole from poor teen gamer. Only those working/professional people who uses adobe is worth the effort.
I did a deep dive into those 'reputable sources' on piracy threads for software. I cracked the exact version of some programs to see how different they really are. It took time to reverse engineer, but it wasn’t too hard, patched for full functionality and all the paid features. Comparing it to different group releases, I found some with tons of obfuscated code, packed executables, anti-debugging anti-VM tricks, certificate pinning, Some releases were clean, but most people wouldn't know better than to grab the first one that pops up
As you mentioned most people wouldn't be able to do that, and as leo mentioned in the video/comments all it takes is these people deciding to release one malicious crack after getting people into a habit of just trusting them and running without precautions to completely ruin a lot of computers or steal a lot of information. The safest way to pirate is to just not pirate, but a lot of people feel like they're entitled to whatever game or software they want and pirate it because why would they ever pay for it, or stuff like oh I hate denuvo and won't buy it but I'm still entitled to it so I'll pirate it. The saddest part is a lot of pirates do buy the games that actually interest them, but then you have pirates who think they're entitled to whatever they want going "if they rerelease it I'll buy it" or "if they remove denuvo I'll buy it", but when it happens they don't and when called out either stay silent or go " it's too expensive for 10 year old roms" or "why would I pay for something I can get for free". I don't agree with piracy, but at least many actually pay for the software they enjoy if it's available to the public for purchase, but then you have people like this making it seem like pirates just all want free stuff.
@@Kairi5431in my opinion "freeloaders" are the minority. People would rather use good service when it's available (like steam). Of course there is a small group of people that you describe that exist but they will exist no matter what. On the other end there are people who will buy even shitty service no matter what. But in the middle there is this undecided group of people that can do one of these depending on the circumstances. And with enshitification of streaming like netflix or content creation like adobe people start to trust the companies less in the quality of their service (because it's predatory) and tend to pirate more. I feel like piracy was much more of a thing in like 2000s, then it started to decline with actually good services and now with the enshitification it's on the rise again. There will still be a small group that will pirate everything. There are some reasons for that like age or income, but if the person is older from 1st world country then it's quite questionable.
lets be honest pirats are often kids that dont have the financial freedom to buy software that is thousands of dollars a year, those kids might be naive, but they still are doing creative work with adobe or things like fusion360@@Kairi5431
As a somewhat season eastern eutopean pirate (don't do it as much anymore) I think it's more important to know WHERE rather than WHAT, some common sense always helps and, of course, nothing is ever 100% safe but I managed to get malware/adware/whatever (that I saw, lol) on my machince only 2 or 3 times over 16+ years of occasionally pirating things
Malware in torrents is definitely not something new, and I would also argue is not necessarily on the rise, maybe it is just being noticed more. Malware injected files hosted on sharing platforms like torrents has been happening since early Napster days and more often than not, are put there by people connected to the companies that are selling the "pirated" software.
As if "trusted" vendors dont use cracks to their own software, when they them-selves lose source code, or even stooped supporting a program, for SO long "CD" cracks become the only way to use said program. One assumes quite incorrectly vendors cheek before releasing, but as many who look into the exe know scene groups name "tags" are still their, leaving one to wonder what else is just left their. Example: Rockstar
@@MilkManCaravan Nintendo, they keep getting caught using roms online. Rom-groups use the header say who the up-loader is, Nintendo latter tried remove and hide it but found out they also place it somewhere in the middle, so other rom-groups cant just take out the header and claim it as their upload. All mega companies are hypocrite and Nintendo fan-boys defend this claiming "it's their roms in the first place" which is not true. The same way it's illegal download/make a copy of somebody else back up doesn't entitle Nintendo to that persons copy. Nintendo breaking the law in the same way as other who download roms.
Ubisoft literally released a crack for Rainbow Six Vegas as a 'patch' so people wouldnt need the cd especially when it was being prompted for.people who bought digital
The real way to fight piracy is to lower the prices to be accessible to more people. I mean, I wont risk to be hacked if the software i need its just 10/20 bucks. You can sell few for a high price or sell a lot for a low price. But this is never going to happen anyway.
@@strob5657 well these days for some games and software you don't actually buy the product,you only buy the license to those products and the company can just remove your access very easily,one example will be Ubisoft,so you don't actually "own" what you pay for
@mszuala no no not like that, I mean in what way does buying the right to access a product justify a moral right to steal the property you're getting access to. It's awful that you don't own the games yes and I do condone piracy but theft is theft and there's no real value in calling it otherwise
@@strob5657 did you know: whenever you buy a game on Steam, they can cancel your account and the game is gone? This is because you didn't buy the game, in fact just just bought the temporary right to play the game.
Solution: Have 2 computers. One for your pirated software, and a different one with no pirated software. Don't enter any information/passwords into the first one that has value to a cybercriminal.
Or... Dual boot with OS level encrypted partitions; not SED. Then, you'll mainly only have to worry about bootkits (as opposed to rootkits), which are becoming ever more common, as well. Just don't use the same password for the disk encryption that is used for something else the virus might gain access to, and sufficiently long and complex enough. I mean, you still have to practice good op sec, anyways. Of course, it could still install a rootkit onto the boot volume of the other OS, which is why you might store the boot volume on a detachable storage media, like a thumb drive, and only insert it while booting the safe environment. Although, if your test environment is Windows and your safe environment is Linux, then your boot volume would reside on a file system the Windows OS can't read, anyways. In that case, I suppose they could put something in the UEFI partition, but that's not as easy since it's supposed to be hidden from the OS. The risk of a media player program being exploitable in a way which could provide access to these protected areas of the system are fairly remote.
Maybe just install it in a VM and configure the network config correctly or just remove the internet from the vm if that app doesn't need it which is usually the case@@TheChadXperience909
In regards to trusted uploaders and their safety, I agree with you. While there are many uploaders and scene groups that are considered trusted, the chance that they could inject malicious code into their releases is never 0%. At any point they could do so, and many pirates wouldn’t realize until it’s too late or someone tells people about it. That’s just a risk you have to take when pirating. While they may have a clean track record, never put 100% trust in them. Always analyze the release when downloading it. Test it in a VM, an isolated bare metal machine, whatever you have to do. Even after all that, if the scene group injected malware, you could still get infected. That’s just the risk of doing this sort of thing, but it’s a risk pirates are willing to take every time they use pirated content. It’s all about reducing the risk as much as possible despite knowing it will never be 100% secure.
@@Notaalt-r8e unluckily for big channels, they have to specifically state that they are against piracy, endermanch did show how to obtain a key for windows 95 by exploiting how the code is made, and youtube still took it down as "promoting piracy"
It was a good decision years ago to switch into FOSS and don't bother with cracking software - especially in the times when viruses aren't those funny popups telling you to delete System32 manually, or flood your drive with b0rn in worse case - anymore
That's why you only download well seeded stuff from private and/or reputable torrent trackers. If there's anything suspicious, chances are there will be people in the comments warning others about it.
I think the worst part about these od that when a crack works, the people will use them again, and their reasoning is "why would it be a hack if it works?" While there is actually no correlation between on and the other.
Download the file to a sandbox environment for analysis. Upon verification of its safety, proceed with transferring it to the host operating system. Ensure that shared folders and other potential security vulnerabilities are disabled throughout the testing phase.
and that's partially why i don't keep so much stuff saved in my thorium... cookies being stolen is already so much. imagine if credit card, crypto wallet, location, all the other stuff that now sites ask nowadays also gets stealen with the cookies... yeah......
I got hacked once. I was just looking for some android utility tools. My email, facebook, telegram all were compromised. But luckily I was able to regain access and I formatted my whole laptop.
Bro pls help how to setup a lab environment like you so i can test the application and do everything you do with internet connection enabled in vm because every godamn youtube video and article mentions you need to turn off the internet connection
Well you DON'T have to disable it, it's a vm after all,i recommend using LTSC (Long Term Support Commercial) Windows,which doesn't have the bloat, use something like Virtual box or QEMU and make sure you have a powerful PC for great performance, create a snapshot of how the system was at the start
i Only get media from torrents (allegedly;) never ever executables. also double, triple check the extensions of all the files...... its sometimes a .mp4.exe etc
i have been torrenting for almost twenty years and i don't even have an antivirus installed. guess how many times i have come across malware? not once.
The one thing I'm not worried about is anyone getting access to any financial systems. They all require a second factor to authenticate. Credit cards use temporary security codes.
heh... my bank uses infiniteFA... they require a video of me saying "my name is ______ and my code is ____" to even log in they analyse the video to determine if its AI or not too. they also keep a log of your voice and face to compare future submittions to, they have an entire 3D scan of my face. so not only do you need my password to have a chance at getting into my bank, you need my voice and face which is going to be hard considering i post no photos online, i have never spoken online and i don't ever plan on doing so. and ontop of ALL OF THAT, you need my secret phrase which i say at the end of each video i send them(this is not a required thing, i just contacted customer service and asked if i could do it) so basically an extra password. don't wanna seem arrogant but... no ones getting into my bank account LOL.
I thought people putting malware in cracks wher for the most part over sure they exist but I thought they where few and far between back in the 90’s/early 2000’s it was extremely common to go pirate and infect the crap out of the family computer
I had to isolate my computer to be able to use this kind of software. My PC doesn't connect to the internet and it doesn't have anything just my work that I design.
"anti piracy" is the real oxymoron here, considering "proper companies" are basically after the same stuff these "pirates" after. And people who stay silent for one but condemn the other are the ones you really should watch out.
If you don't know what your doing then don't. If you do & have the hardware to do it then create a vm with a snapshot. Isolate it in your network with a vlan & make sure you don't do anything else on this vm. As soon as your done then rollback to the snapshot when done. There are vm escapes but they are rare enough i probably wouldn't worry.
@@pudicus2 sure go ahead and get all your accounts comprised. Let them take over your bank accounts, ect... I know what i'm doing & have yet to have anyone compromise any of my accounts.
if one is for non-sensitive stuff and the other is for everything that matters, it should be safe as long as the drive is unplugged, and of course make sure you trust everything you take from the other system (documents, executables, etc) making sure they aren't infected.
As far as I know, yes and no. Usually malware inside a video file is only effective if it's exploiting a vulnerability of your media player of choice. Secure media players will just ignore that payload, or rather, the malware part. If you take the good practice of always keeping software up-to-date, and not download from sketchy websites, you shouldn't worry too much.
If you use popular media player like VLC chances of geting hacked/exploited is low cuz this type of exploits are really hard to find and every one of them is too expensive to use on random file uploaded to internet. If you are not super popular crypto investor that can be targeted in direct attack there is nothing to worry about... but it's possible. If you really want you can always spin vm or docker container of VLC.
Well, in a world where Windows 11 comes with malware (copilot) and most 'original' comes with a lot of bloat, ads and requires monthly payment, pirate software is worth it.
Thanks for the video. It detects a crack/patch/keygen and you decide to run it anyway. What about after the fact detection? Does it still detect something?
What if we run the patch in a windows sandbox or virtual machine and then copy the cracked software (patch applied) to host machine which has an anti virus (kaspersky or bitdefender), and now the folder is detected as clean...? (for a step ahead added a block for the exe in firewall) ? thoughts on this ????
How to identify that Autocad or Civil 3D, are hacked or are using patch, keygen, or activator. We downloaded 1 for testing, and no antivirus caught activator as one person could find out they get hacked.
if you download app scan with premium AV software and it has no detection. can it have malware when you install the app/software via repack? does blocking exe file via firewall help?
Safe for me. The softwares are the most dangerous one because only people with job will use those. Games? The don’t care about the info and credit card of a teen downloading a pirated game. For decades im using those with no issue. I only got a virus from my friend’s external hdd. Fitgirl is more safe than my friend for sure.
I use freeware that's close to Adobe I suppose, but I haven't used a cracked copy of their products since like CC 2016 or something earlier also idk I remember the Word/Office used to be a popular one but I also replaced that with freeware. Plenty of freeware that will do edits just fine. Also 🐧.
At 50 seconds it looks normal, at 1 minute it does not. I assume the recording is just framed well and you are just looking at edge. One I have used before though is "Floorp Browser" which is firefox but has some extra settings and themes to make it look like edge.
How confident are you that your network environment is sufficiently secure, and the VM won't be used as a trojan horse to get around your firewall? Are you sure that your devices are all secure; including your smart TV, and other IOT devices? Do any of your servers include a web interface? Have password protected SSH ports open? Have you made sure that your WIFI password is sufficiently unique from your other passwords?
One question, How do you login with bitwarden extension and Virus total account in the VM while executing the virus? Don’t you fear it would steal these credentials? Thanks
And... Use it for what, exactly? To gain access to your account and confirm that it's being detected? So, simply use a unique password along with multi-factor auth, and then rotate your password on a clean system immediately following the evaluation. In other words, practice good op sec, generally. Bruh! Do you even watch this UA-cam channel?
I keep seeing black flicker of what seems like cmd on my screen. Is that a malware. Nothing detects it. Not even Norton. It's very constant and don't know if it's really Microsoft's screenshotting things [but I'm on windows 10]. Please inform/clarify the basics to the possibilities. :(
@@tanmaypanadi1414 That's it? I definitely can't do that. Got too much work as is to focus on. I need a software or a system checker to see what's flickering my CMD.
thought experiment: if i would download a torrent crack that is over the maximum filesize of VirusTotal (650MB) what is the best way to see if it contains malicoius contents?
I would like to know how to identify software piracy, even when no antivirus detects them as viruses, we took 1 for testing, and no online antivirus detected them as viruses, and it was an activator.
depends on the program, some activations are really dumb so it's just a reverse-engineered equation to generate a serial key from pure maths. it's pretty typical in older software
Run the crack in a virtual machine. Extract the patched file to the active system after patching has been done. If for whatever reason you don't have any alternative methods. I strongly advise not to pirate small application developers.
Can you make a video showing how to create a separate partition in your Windows machine so that you could install whatever you want in it and if it happens to be malware you could just format everything and start from scratch without losing anything and without having the other partition with all your data/files infected?
If you are going to do all that, much easier to use a disposable VM for all your browsing, but I'm not going to pretend me or anybody I know wants to use their computer like that.
@@pcsecuritychannelso if I use the VM to gain access to the Cracked Software, without the risk of it infecting my machine, how do I get the file I made in that cracked software to my actual Computer? Once I close the VM (Virtual Machine) the cracked software is gone but so is my file no? How do I keep the file?
@@pcsecuritychannel what if someone had 2 Drives with 2 Separate OS's on each drive and Dual boot it? one is for General use and another One for this sort of illegal stuffs and test? what would Happen? will it be better and Safer? can one use one drive with OS for illegal Stuffs and will not have any Account Associated with that OS, only Pirated stuffs, no online activity. will he be safe? one OS is for Accounts and Legal Use/Purchase and another OS on a Separate Drive for Pirated Stuffs? Lot Of our Computers Does not Meet The Minimum Requirements For Win 11. Support for Win 10 is about end next year. In Low income Country like ours We Have to Spend Our Money Carefully. thats why we Planned to do this sort of Stuffs to Keep Ourselves Safe. Life is Hard. Besides we dont want to Produce E-waste. our Machine is Completely Functional.
Boa noite amigo,seu canal é muito top,se possivel poderia explanar sua opiniao e fazer um teste sobre o ativador de windows e pacote office chamado massgrav,o que acontece de verdade ao usar ele como ativador no sistema,desde ja agradeço sua atenção e sucesso sempre.
if internet was blocked it could help block stealers, though a virtual machine (or different machine if possible) would be better further layering yourself away from it.
To be fair, Adobe software drains your bank account over time when it isn't cracked too.
LOL exactly. By pirating them you take the risk, but by subscribing to them it's guaranteed.
@@Echomemes source depend bro and yeah if you have money then but real
@@leonidas14775 yeah same crack works better
You can't even use anything Adobe anymore without having to sign into Creative Cloud, I wish I knew a workaround, because I miss having Photoshop.
and made whole Flash EOL because of inability to properly maintain it's security. pathetic dudes
"Trusted pirate" isn't an oxymoron, because there is really awesome trusted pirates out there.
And those are the people who provided malware free software for years.
Example?
@@shuvohira5979 Razor 1911, among many others
@@shuvohira5979 If you are into gaming, Fitgirl.
@@shuvohira5979 FitGirl
he's right, because there are plenty of trusted sites and crackers who have turned malicious, so you cannot bet your life on these anonymous people
Piracy megathread is your best friend, as a student I didn't have money to buy photoshop. Wacatac trojan is the most common false positive with cracks.
Do you mean the one on reddit?
@@handysetiawan8981 yep
@@handysetiawan8981 yup, the one in r/piracy.
@@handysetiawan8981 there's the reddit version and the fmhy version, both are the same.
@@handysetiawan8981yes its the safest option
Problem with cracks are how they get flagged just for being a crash even if they are safe.
So you don't even know what is or isn't infected.
and then you get totally valid DLL injectors to get a 20+ year old game to run on modern systems being flagged just because you want it to not crash or run like dogshit because 16/32 bit support died a long time ago and/or you want to run a directX to vulkan translation layer and/or shaders
@@themusesquad8554 Why bro don't download blindly from anywhere at first do some research and found the site
If it was detected by only 1 av and it si BkavPro then it is safe, if it is detected by lots of avs including Kaspersky etc then it is infected.
I'm pretty sure AV software gets paid to flag those files as a scare tactic.
@@karolstopinski8350Not really. AV/EDR/Sandbox software doesn't check if malware is *actually* bad because it's hard to define what "bad" means. They only look for symptoms and common exploit behaviors. Which is totally what many cracks, trainers, mods, dll injectors do (for legit reasons). AV doesn't know that it's "ethical exploit" doing some kind of exploitation that user expects it to do. Malware detecting systems are simple creatures - they see something "sus", they flag it. You know it's like browser extension that reads your cookies - behavioral AV analysis will say it steals your data. But it may be just some fancy auto-login extension or any other thing that legitimately uses your cookies for good reason. I mean just look at Skyrim SKSE - it totally behaves like full fledged malware lol
Your mentioning of recall made me smile. I don’t think anyone with an inkling of real world security has asked for it, or copilot. Both scare me because of their obvious security risks.
I'm fine with copilot, as long as its running on a microsoft owned server far far away and not my PC>
@@leonidas14775 Agreed. I have CP and RC turned off in policy settings using ShutUpWindows10. As a note; the latest features update to win11 turned things back on again that I'd turned off - so be warned that Microsoft will try to be shifty about Recall and Copilot. I don't know why they're trying to ram these things down our collective throats, but it's really making me reconsider using Microsoft products for any daily driver other than gaming.
Who has enough power to instruct Microsoft to implement this?
I got windows enterprise LTSC just to avoid that.
CoPilot is a welcome replacement to Cortana
Just be more aware of what you download, and download from trusted, reputable sources.
this is not always working. Do not forget when CCleaner website was hacked and installer replaced with malicious version.
Yeah use the megathread then you are good and only choose the goat
@@zulhakimhafizibinmohdzulke4581 That one girl that's fit came in clutch throughout my broke teenage years
Ok no Problem on windows 20000 malicious dll for you
#smurtboy
Everything is a skill, pirating too. You just gotta learn how to do it safey and where are the safe sites.
The best thing to do is reading a lot about certain pages security, and never download from sites with tons of shorteners.
what are "shorteners"?
@@ShockSmile Short URLs like this.that/123 that takes you to another short.url/456 that takes you to another and another and finally the download page
@@ShockSmileI could be wrong, but I think they're talking about link shorteners like adfly
@@bcj842 yeah those nested shortener sites where you click on one and it brings to another, and another. Sometimes, most of the time, the endgame is not giving you malware but profitting from ads where at the end there's just smoke. Think about it, if they want to infect you with malware it'd be counterproductive to make it harder for you to download the file.
Its more like trusted uploaders vs pirates, its a way to tell folks this user has uploaded for years malware free software. Its not a guarantee its a summary of their history on the platform.
Even than folks still check for themselves, pirates value good security software too. If someone has years of documented work uploading clean software, the upload is a few weeks old, and major antivirus software say its safe (along with virus total) it's reasonally safe software.
Its really not that complicated, the first rule is to trust no one. Even than it doesn't mean "trusted" uploaders are safe, it's just a proven track record vs some random uploaded you have never heard of.
tldr:
some people shouldn't be trusted and some of those should not never, ever be trusted.
One thing you have very wrong is "and major antivirus software say its safe" that has nothing to do with how safe a program is. Good hackers know how to make malware fully undetected.
@@rawbmar1166
"the upload is a few weeks old, and major antivirus software say its safe (along with virus total) it's reasonally safe software."
FOR games it is safe if you download from trusted uploaders.
That is why this guy uses a software.
Hackers will not bother to waste time building reputation and stole from poor teen gamer.
Only those working/professional people who uses adobe is worth the effort.
I did a deep dive into those 'reputable sources' on piracy threads for software. I cracked the exact version of some programs to see how different they really are. It took time to reverse engineer, but it wasn’t too hard, patched for full functionality and all the paid features. Comparing it to different group releases, I found some with tons of obfuscated code, packed executables, anti-debugging anti-VM tricks, certificate pinning, Some releases were clean, but most people wouldn't know better than to grab the first one that pops up
As you mentioned most people wouldn't be able to do that, and as leo mentioned in the video/comments all it takes is these people deciding to release one malicious crack after getting people into a habit of just trusting them and running without precautions to completely ruin a lot of computers or steal a lot of information.
The safest way to pirate is to just not pirate, but a lot of people feel like they're entitled to whatever game or software they want and pirate it because why would they ever pay for it, or stuff like oh I hate denuvo and won't buy it but I'm still entitled to it so I'll pirate it.
The saddest part is a lot of pirates do buy the games that actually interest them, but then you have pirates who think they're entitled to whatever they want going "if they rerelease it I'll buy it" or "if they remove denuvo I'll buy it", but when it happens they don't and when called out either stay silent or go " it's too expensive for 10 year old roms" or "why would I pay for something I can get for free". I don't agree with piracy, but at least many actually pay for the software they enjoy if it's available to the public for purchase, but then you have people like this making it seem like pirates just all want free stuff.
@@Kairi5431in my opinion "freeloaders" are the minority. People would rather use good service when it's available (like steam). Of course there is a small group of people that you describe that exist but they will exist no matter what. On the other end there are people who will buy even shitty service no matter what. But in the middle there is this undecided group of people that can do one of these depending on the circumstances. And with enshitification of streaming like netflix or content creation like adobe people start to trust the companies less in the quality of their service (because it's predatory) and tend to pirate more.
I feel like piracy was much more of a thing in like 2000s, then it started to decline with actually good services and now with the enshitification it's on the rise again.
There will still be a small group that will pirate everything. There are some reasons for that like age or income, but if the person is older from 1st world country then it's quite questionable.
lets be honest pirats are often kids that dont have the financial freedom to buy software that is thousands of dollars a year, those kids might be naive, but they still are doing creative work with adobe or things like fusion360@@Kairi5431
is there a good guide on how to do that stuff? i only know basic RE and cracked a couple apps b4
Those measures are there because AV false flags all cracks
Love to Dodi, fitgirl, R2R, Razor and the rest of the legends ❤️
Can you provide good software uploaders 🤓
As a somewhat season eastern eutopean pirate (don't do it as much anymore) I think it's more important to know WHERE rather than WHAT, some common sense always helps and, of course, nothing is ever 100% safe but I managed to get malware/adware/whatever (that I saw, lol) on my machince only 2 or 3 times over 16+ years of occasionally pirating things
Malware in torrents is definitely not something new, and I would also argue is not necessarily on the rise, maybe it is just being noticed more. Malware injected files hosted on sharing platforms like torrents has been happening since early Napster days and more often than not, are put there by people connected to the companies that are selling the "pirated" software.
Thank you for being one of the best channels for niche security tips like these! You're a real hero!
yeah only the best ones will recommend a russian anti-virus lmfao
@@marinebymistakedo you know any better? No can you provide real anti virus tests? No
Then why are you here?
Actually the Recall feature is crazy for storing all the screenshots in plain files.
Are you sure about that? Could you provide technical details which demonstrate your claim?
@@TheChadXperience909 do a UA-cam search, big technical and security UA-camrs covered it
As if "trusted" vendors dont use cracks to their own software, when they them-selves lose source code, or even stooped supporting a program, for SO long "CD" cracks become the only way to use said program. One assumes quite incorrectly vendors cheek before releasing, but as many who look into the exe know scene groups name "tags" are still their, leaving one to wonder what else is just left their. Example: Rockstar
Wow does that really happen? What other companies have you noticed doing this
@@MilkManCaravan Nintendo, they keep getting caught using roms online. Rom-groups use the header say who the up-loader is, Nintendo latter tried remove and hide it but found out they also place it somewhere in the middle, so other rom-groups cant just take out the header and claim it as their upload.
All mega companies are hypocrite and Nintendo fan-boys defend this claiming "it's their roms in the first place" which is not true. The same way it's illegal download/make a copy of somebody else back up doesn't entitle Nintendo to that persons copy. Nintendo breaking the law in the same way as other who download roms.
@@JorgeLopez-qj8pu thats insane and incredibly hypocritical
Ubisoft literally released a crack for Rainbow Six Vegas as a 'patch' so people wouldnt need the cd especially when it was being prompted for.people who bought digital
The real way to fight piracy is to lower the prices to be accessible to more people. I mean, I wont risk to be hacked if the software i need its just 10/20 bucks.
You can sell few for a high price or sell a lot for a low price.
But this is never going to happen anyway.
Also need to solve the problems around weird region locks. Like why can I buy Jurassic Park book on Kindle in the US, but not on the Kindle in the UK?
I'd just take advantage of every discount
We’ve got a genuine economics genius here folks! Companies could make the same revenue by selling at low prices but have inexplicably decided not to.
Ur mom nobody can defeat piracy 😂
@@curtismantle no they won't. Y'all haven't met bottom barrel like me😂.
I don't even pay for Spotify
If buying isn't owning, pirating isn't stealing.
i never understood the purpose of this line tbh
@@strob5657 well these days for some games and software you don't actually buy the product,you only buy the license to those products and the company can just remove your access very easily,one example will be Ubisoft,so you don't actually "own" what you pay for
@mszuala no no not like that, I mean in what way does buying the right to access a product justify a moral right to steal the property you're getting access to. It's awful that you don't own the games yes and I do condone piracy but theft is theft and there's no real value in calling it otherwise
@@strob5657 did you know: whenever you buy a game on Steam, they can cancel your account and the game is gone? This is because you didn't buy the game, in fact just just bought the temporary right to play the game.
@moweME yeah I heard about the legal mess that happened. Kinda silly how the consumer ends up getting screwed LMAO
Solution: Have 2 computers. One for your pirated software, and a different one with no pirated software. Don't enter any information/passwords into the first one that has value to a cybercriminal.
if it can connect to your network it can still do damage to your other machines
Or... Dual boot with OS level encrypted partitions; not SED. Then, you'll mainly only have to worry about bootkits (as opposed to rootkits), which are becoming ever more common, as well. Just don't use the same password for the disk encryption that is used for something else the virus might gain access to, and sufficiently long and complex enough. I mean, you still have to practice good op sec, anyways. Of course, it could still install a rootkit onto the boot volume of the other OS, which is why you might store the boot volume on a detachable storage media, like a thumb drive, and only insert it while booting the safe environment. Although, if your test environment is Windows and your safe environment is Linux, then your boot volume would reside on a file system the Windows OS can't read, anyways. In that case, I suppose they could put something in the UEFI partition, but that's not as easy since it's supposed to be hidden from the OS. The risk of a media player program being exploitable in a way which could provide access to these protected areas of the system are fairly remote.
Maybe just install it in a VM and configure the network config correctly or just remove the internet from the vm if that app doesn't need it which is usually the case@@TheChadXperience909
Can you just use VM for "oh crap I just need to use this cracked piece of software for one time real quick" instead of second PC?
@@АндрэйБараноўскі Do you really have to ask? In that case, I'd find a different YT channel to watch.
That’s very useful. I didn’t know that some venders will actually tell you what’s going on instead of just telling you to stop
In regards to trusted uploaders and their safety, I agree with you. While there are many uploaders and scene groups that are considered trusted, the chance that they could inject malicious code into their releases is never 0%. At any point they could do so, and many pirates wouldn’t realize until it’s too late or someone tells people about it.
That’s just a risk you have to take when pirating. While they may have a clean track record, never put 100% trust in them. Always analyze the release when downloading it. Test it in a VM, an isolated bare metal machine, whatever you have to do.
Even after all that, if the scene group injected malware, you could still get infected. That’s just the risk of doing this sort of thing, but it’s a risk pirates are willing to take every time they use pirated content. It’s all about reducing the risk as much as possible despite knowing it will never be 100% secure.
Why's the Fox made out of Steel? Doesn't seem like a very agile material.
Great video, as always. I wish I could have seen this a few minutes ago lmao.
rip
I love how he is also not promoting piracy and is against it but also telling us how to stay safe just thought I'd comment on that
well he wouldn’t want to break TOS
@Graahk-r8u considering how many videos are on UA-cam about piracy I don't think it would have mattered
@@Notaalt-r8e unluckily for big channels, they have to specifically state that they are against piracy, endermanch did show how to obtain a key for windows 95 by exploiting how the code is made, and youtube still took it down as "promoting piracy"
@@Firespecialstar yeah. louis rossman and LTT are other great examples
I sense Nintendo simp fanboy 🫥🤔
What the hackers don't know, I wouldn't crack software if I would have a credit card lol
It was a good decision years ago to switch into FOSS and don't bother with cracking software - especially in the times when viruses aren't those funny popups telling you to delete System32 manually, or flood your drive with b0rn in worse case - anymore
That's why you only download well seeded stuff from private and/or reputable torrent trackers. If there's anything suspicious, chances are there will be people in the comments warning others about it.
I think the worst part about these od that when a crack works, the people will use them again, and their reasoning is "why would it be a hack if it works?" While there is actually no correlation between on and the other.
Simple: keep the machine offline or at most on a subnet w/o internet access. That is the price.
Love seeing the Bitwarden browser plug in!
0:07 Ah yes, the student who can't afford JetBrains at the ridiculously high cost of... Uh... Free?
3:50 not my cookiesssss😢
Download the file to a sandbox environment for analysis. Upon verification of its safety, proceed with transferring it to the host operating system. Ensure that shared folders and other potential security vulnerabilities are disabled throughout the testing phase.
and that's partially why i don't keep so much stuff saved in my thorium... cookies being stolen is already so much. imagine if credit card, crypto wallet, location, all the other stuff that now sites ask nowadays also gets stealen with the cookies... yeah......
Very good video. I always run everything in a VM with no Internet access. Not sure if that’s the smartest way to go about it but that’s all I’ve got.
Yup even better and sandbox in a VM, setting up a VM can be some work so better lazy than tired.
Not for potato PCs.
I just use fake email and all on my laptop
I miss Kaspersky so much!
+15 rub, comrade!
screeching.wav
L government moment. Im chilling in Europe
Nice to see Kaspersky
I got hacked once. I was just looking for some android utility tools. My email, facebook, telegram all were compromised. But luckily I was able to regain access and I formatted my whole laptop.
Only stick to megathread you are good as
Which one?
@heyjohnsmith Fitgirl and Dodi
I'd personally recommend free media heck yeah for an up to date megathread!
Bro pls help how to setup a lab environment like you so i can test the application and do everything you do with internet connection enabled in vm because every godamn youtube video and article mentions you need to turn off the internet connection
Well you DON'T have to disable it, it's a vm after all,i recommend using LTSC (Long Term Support Commercial) Windows,which doesn't have the bloat, use something like Virtual box or QEMU and make sure you have a powerful PC for great performance, create a snapshot of how the system was at the start
i Only get media from torrents (allegedly;)
never ever executables. also double, triple check the extensions of all the files...... its sometimes a .mp4.exe etc
i have been torrenting for almost twenty years and i don't even have an antivirus installed. guess how many times i have come across malware? not once.
The one thing I'm not worried about is anyone getting access to any financial systems. They all require a second factor to authenticate. Credit cards use temporary security codes.
2FA is never a guarantee
heh... my bank uses infiniteFA... they require a video of me saying "my name is ______ and my code is ____" to even log in
they analyse the video to determine if its AI or not too.
they also keep a log of your voice and face to compare future submittions to, they have an entire 3D scan of my face.
so not only do you need my password to have a chance at getting into my bank, you need my voice and face which is going to be hard considering i post no photos online, i have never spoken online and i don't ever plan on doing so.
and ontop of ALL OF THAT, you need my secret phrase which i say at the end of each video i send them(this is not a required thing, i just contacted customer service and asked if i could do it) so basically an extra password.
don't wanna seem arrogant but... no ones getting into my bank account LOL.
I thought people putting malware in cracks wher for the most part over sure they exist but I thought they where few and far between back in the 90’s/early 2000’s it was extremely common to go pirate and infect the crap out of the family computer
I had to isolate my computer to be able to use this kind of software. My PC doesn't connect to the internet and it doesn't have anything just my work that I design.
Breaking news, your work is infected
It’s a great motivator to learn forensic analysis of files. Coincidentally, it’s a big part of what I’m learning right now. 😊
Don't blame all torrent trackers. Download from trusted ones and you'll be fine. No, I don't mean the pirates bay.
Unfortunately all cracks will be classified as malware. It's really hard to know which ones are legit and which ones aren't.
Hey sir which AV u are using now?
Can u check "tron virus removal"
"anti piracy" is the real oxymoron here, considering "proper companies" are basically after the same stuff these "pirates" after.
And people who stay silent for one but condemn the other are the ones you really should watch out.
Thoughts on safety of massgraves windows?
Awesome video as always Leo!
If you don't know what your doing then don't. If you do & have the hardware to do it then create a vm with a snapshot. Isolate it in your network with a vlan & make sure you don't do anything else on this vm. As soon as your done then rollback to the snapshot when done. There are vm escapes but they are rare enough i probably wouldn't worry.
If they escape the VM they deserve my data 😂
@@mik3lang3lo 😜
This is a shit take. Everyone learns by doing something they don’t know how to at some point.
@@pudicus2 sure go ahead and get all your accounts comprised. Let them take over your bank accounts, ect... I know what i'm doing & have yet to have anyone compromise any of my accounts.
@@mik3lang3lo everyone have your data bro what do u think google provide you free service
What if i dual boot with different drive? So one drive is for torrent programs but the other is for normal usage to give airgap the system
i also like to know more about this.
if one is for non-sensitive stuff and the other is for everything that matters, it should be safe as long as the drive is unplugged, and of course make sure you trust everything you take from the other system (documents, executables, etc) making sure they aren't infected.
Can Malware be inside movies in type of files like .mp4 or .mkv?
yes, it can even be on the website or streaming service by just visiting. Use a virtual machine and watch the movies on there.
@@superkoopatrooper4879 no way 🤯
As far as I know, yes and no. Usually malware inside a video file is only effective if it's exploiting a vulnerability of your media player of choice. Secure media players will just ignore that payload, or rather, the malware part. If you take the good practice of always keeping software up-to-date, and not download from sketchy websites, you shouldn't worry too much.
Unlikely
If you use popular media player like VLC chances of geting hacked/exploited is low cuz this type of exploits are really hard to find and every one of them is too expensive to use on random file uploaded to internet. If you are not super popular crypto investor that can be targeted in direct attack there is nothing to worry about... but it's possible.
If you really want you can always spin vm or docker container of VLC.
Well, in a world where Windows 11 comes with malware (copilot) and most 'original' comes with a lot of bloat, ads and requires monthly payment, pirate software is worth it.
Thanks for the video. It detects a crack/patch/keygen and you decide to run it anyway. What about after the fact detection? Does it still detect something?
What if we run the patch in a windows sandbox or virtual machine and then copy the cracked software (patch applied) to host machine which has an anti virus (kaspersky or bitdefender), and now the folder is detected as clean...? (for a step ahead added a block for the exe in firewall) ? thoughts on this ????
How to identify that Autocad or Civil 3D, are hacked or are using patch, keygen, or activator. We downloaded 1 for testing, and no antivirus caught activator as one person could find out they get hacked.
if you download app scan with premium AV software and it has no detection. can it have malware when you install the app/software via repack? does blocking exe file via firewall help?
why it's a firefox icon but an edge UI?
What about fitgirl
Remember kids, don’t pirate but if you are going to learn about Virtual machines first.
What about Fitgirl or Dodi?
Mostly secure if you use their official website
Safe for me. The softwares are the most dangerous one because only people with job will use those.
Games? The don’t care about the info and credit card of a teen downloading a pirated game.
For decades im using those with no issue.
I only got a virus from my friend’s external hdd. Fitgirl is more safe than my friend for sure.
I use freeware that's close to Adobe I suppose, but I haven't used a cracked copy of their products since like CC 2016 or something earlier also idk I remember the Word/Office used to be a popular one but I also replaced that with freeware. Plenty of freeware that will do edits just fine. Also 🐧.
thanks for the heads up.
RIP Demonoid
Hello, can you pack something nasty in .mkv along side with actual video sequnce?
I've never gotten a virus from a torrent, ever.
dude why does your firefox's UI look like edge browser ? and brother thanks making this video it's enlightening !
That's defaults Firefox
At 50 seconds it looks normal, at 1 minute it does not. I assume the recording is just framed well and you are just looking at edge. One I have used before though is "Floorp Browser" which is firefox but has some extra settings and themes to make it look like edge.
but if I don t get any detections on virus total? when I go to behave section it still say like mitre attack or others things but it say is safe
@@loryt690 manytime you got when uploading software but check the vendors many time detect it false positive
Fitgirl never let me down
Is UA-cam recommending this video to me on how to not roach out? 😂
How about using cracks in combination with virtual machines? Does this make any difference?
How confident are you that your network environment is sufficiently secure, and the VM won't be used as a trojan horse to get around your firewall? Are you sure that your devices are all secure; including your smart TV, and other IOT devices? Do any of your servers include a web interface? Have password protected SSH ports open? Have you made sure that your WIFI password is sufficiently unique from your other passwords?
Now end of 2024years we wanna see best Antivirus home version or best endpoint security vs 3000 latest malware compared to what different for lines
One question, How do you login with bitwarden extension and Virus total account in the VM while executing the virus?
Don’t you fear it would steal these credentials?
Thanks
And... Use it for what, exactly? To gain access to your account and confirm that it's being detected? So, simply use a unique password along with multi-factor auth, and then rotate your password on a clean system immediately following the evaluation. In other words, practice good op sec, generally.
Bruh! Do you even watch this UA-cam channel?
Easy solution: skip college. Waste of time and money anyway.
Anyone can recommend a YT video similar to this but with a morr detailed breakdown on best practices before installing unknown software?
I keep seeing black flicker of what seems like cmd on my screen. Is that a malware. Nothing detects it. Not even Norton. It's very constant and don't know if it's really Microsoft's screenshotting things [but I'm on windows 10]. Please inform/clarify the basics to the possibilities. :(
format and reinstall windows if its truly a cause of concern.
@@tanmaypanadi1414 That's it? I definitely can't do that. Got too much work as is to focus on. I need a software or a system checker to see what's flickering my CMD.
Does it say it's from "HP PC Hardware Diagnostics"?
Check the windows logs in command center when it happens. You'll likely find what happened.
You can view everything in Autoruns, but it requires some knowledge
Back your data up regularly, or store them at a safe spsce, and you're pretty much set
Just downloaded something insecure and infected my pc. Lets try to fix it now.
thought experiment: if i would download a torrent crack that is over the maximum filesize of VirusTotal (650MB) what is the best way to see if it contains malicoius contents?
Bloated executable is not that common, but they exist. Try to zip it and it would be small
Obviously, you probably shouldn't, unless you're a professional and really know what you're doing.
I would like to know how to identify software piracy, even when no antivirus detects them as viruses, we took 1 for testing, and no online antivirus detected them as viruses, and it was an activator.
depends on the program, some activations are really dumb so it's just a reverse-engineered equation to generate a serial key from pure maths. it's pretty typical in older software
Run the crack in a virtual machine. Extract the patched file to the active system after patching has been done. If for whatever reason you don't have any alternative methods. I strongly advise not to pirate small application developers.
I really wouldn't be pirating if I had the money to buy the game now would I?
show us how to get a good sandbox going?
You're such an Inspiration.
what if the torrent has many seeders, not that much would be carrying viruses, right?
How about on Mac & Linux ?
@@sm79165 That's a dumb statement
@ No, even so, Im against to giveaway Adobe both money & my assets to feed their AI..
Can you make a video showing how to create a separate partition in your Windows machine so that you could install whatever you want in it and if it happens to be malware you could just format everything and start from scratch without losing anything and without having the other partition with all your data/files infected?
If you are going to do all that, much easier to use a disposable VM for all your browsing, but I'm not going to pretend me or anybody I know wants to use their computer like that.
@pcsecuritychannel VM?
@@Lickzalot virtual machine.
@@pcsecuritychannelso if I use the VM to gain access to the Cracked Software, without the risk of it infecting my machine, how do I get the file I made in that cracked software to my actual Computer? Once I close the VM (Virtual Machine) the cracked software is gone but so is my file no? How do I keep the file?
@@pcsecuritychannel what if someone had 2 Drives with 2 Separate OS's on each drive and Dual boot it? one is for General use and another One for this sort of illegal stuffs and test? what would Happen? will it be better and Safer? can one use one drive with OS for illegal Stuffs and will not have any Account Associated with that OS, only Pirated stuffs, no online activity. will he be safe? one OS is for Accounts and Legal Use/Purchase and another OS on a Separate Drive for Pirated Stuffs? Lot Of our Computers Does not Meet The Minimum Requirements For Win 11. Support for Win 10 is about end next year. In Low income Country like ours We Have to Spend Our Money Carefully. thats why we Planned to do this sort of Stuffs to Keep Ourselves Safe. Life is Hard. Besides we dont want to Produce E-waste. our Machine is Completely Functional.
*You got one side who are against pirates then you got the other side who are for pirates even some youtubers endorse pirate actions*
Just don't have sensitive information on your computer where you download cracked programs
Do you know where I can download a Windows 7 "iso" for my pentester lab?
Cant you buy an offical install disk online?
Boa noite amigo,seu canal é muito top,se possivel poderia explanar sua opiniao e fazer um teste sobre o ativador de windows e pacote office chamado massgrav,o que acontece de verdade ao usar ele como ativador no sistema,desde ja agradeço sua atenção e sucesso sempre.
what if you ran it and a reputable antivirus like bitdefender or kaspersky blocked it?
whats vastotal?
I love this guy so much it's unreal.
Would running scatchy software in sandboxy plus help ?
if internet was blocked it could help block stealers, though a virtual machine (or different machine if possible) would be better further layering yourself away from it.
If you must run it, run it in VM and get your job done there in the place where you don't store anything
guys where do i get fl studio 21.4 cracked please
Can this virus be in a torrent pdf or epub?