What are some good ways to create authentication systems for applications you want to keep private but are at risk of being leaked by other people?
In short: there aren't any.
Omit the "good" then.
I have an idea that I haven't fully thought through, but it invovles taking a value which is unique for each user, but never changes and have that value sent to a Website which will encrypt it and come up with some sort of "key." The user takes that key and puts it into a file, and the application decrypts the key and checks it against their unique value that never changes, and if it passes, the application proceeds.
Base it on harddrive serial.
Quote from: Banana fanna fo fanna on December 12, 2004, 07:11 PM
In short: there aren't any.
That is a horrible answer.
QuoteBase it on harddrive serial.
Base what on hard drive serial?
"Good" is a relative term. No matter how great your protection scheme is, it can always be broken. You want to find some middle ground-- there isn't much point in spending a lot of time on a elaborate scheme if no one has any reason to want to break it. If there is a reason for someone to want to break it, you need to implement something which will require a significant amount of time/skill to defeat. You can create protection which will defeat the average user. You can create protection which will defeat an amateur hacker. You can create protection which will defeat an experienced hacker. However, will there be such a demand for your application that an experienced hacker will ever take a look at it?
The protection need not warrant an experienced hacker, but it needs to be sufficient enough to prevent people from just using the application without permission granted, and made to where they can't just get a key without actually doing some hacking, and that hacking they do do shouldn't be as easy as 123 to get break the protection, but it doesn't need to be extensive protection as I said.
QuoteBase what on hard drive serial?
Use the persons harddrive serial number for authorization. Or maybe generate a key based on their serial number.
Rabbit did his authorization using a haddrive serial number, I don't remember the exact method though.
QuoteThe protection need not warrant an experienced hacker
It doesn't take much experience to map the address where your auth file is stored to a point to a different one, or nop out a few lines after disassembling it. However, as Eibro said, would anybody care?
Doing it based on harddrive serial is useless, because they can just bypass that part of the code.
The best way is just to make your software opensource, and release the entire thing publicly, encouraging others to work on it, and provide patches if they find a bug. It works surprisingly well. Think about the REASON you want it to be closed. The only one I can think of is so that people who don't have it say, "I want it! I'm going to be friends with the person who wrote it so that he'll give ME a copy!" and anybody who does it for that reason is pathetic.
Look at Skywing's BinaryChat: it had amazing protection on it, since we all know that Skywing is totally elite, and somebody has broken it. There isn't a lot you can do to prevent a serious hacker from getting at your code, short of not giving it to them. And even that doesn't always work (see also: half life 2).
Quote from: iago on December 13, 2004, 08:27 AMThink about the REASON you want it to be closed. The only one I can think of is so that people who don't have it say, "I want it! I'm going to be friends with the person who wrote it so that he'll give ME a copy!" and anybody who does it for that reason is pathetic.
There's also the reasoning that it's simply too dangerous for public consumption. Consider what a mess it would wreak on BW public gaming if the sum total of SCRL (Adron's SC HDL), SCE (Sky/Grok's SC HDL), and my BW work were merged into an open source project and released. Obviously a special case, but it is another reason against release. :)
Quote from: Kp on December 13, 2004, 10:30 AM
Quote from: iago on December 13, 2004, 08:27 AMThink about the REASON you want it to be closed. The only one I can think of is so that people who don't have it say, "I want it! I'm going to be friends with the person who wrote it so that he'll give ME a copy!" and anybody who does it for that reason is pathetic.
There's also the reasoning that it's simply too dangerous for public consumption. Consider what a mess it would wreak on BW public gaming if the sum total of SCRL (Adron's SC HDL), SCE (Sky/Grok's SC HDL), and my BW work were merged into an open source project and released. Obviously a special case, but it is another reason against release. :)
Indeed, I should have mentioned that. The only thing that I've made that I haven't released with source is my Starcraft/Diablo hacks. I completely agree, some things are destructive. But in general, my statements stand :P
On a sidenote, to be technical, there is a lot of code that I've never made public for the sole reaason that I don't think anybody would care. Of course, if somebody asked me for it (for example, my Java Huffman implementation), I'd happily give it to them.
Quote from: iago on December 13, 2004, 08:27 AM
Doing it based on harddrive serial is useless, because they can just bypass that part of the code.
That applies to a lot of current methods. Think of those games that we cracked when you were teaching me to read Assembly.
QuoteThe best way is just to make your software opensource, and release the entire thing publicly, encouraging others to work on it, and provide patches if they find a bug. It works surprisingly well.
Despite his reason, making it open source/freely available kinda defeats the point which is to keep it private...
Quote from: iago on December 13, 2004, 08:27 AM
Look at Skywing's BinaryChat: it had amazing protection on it, since we all know that Skywing is totally elite, and somebody has broken it.
You forgot ZeroBot (binary version)! *;)* (http://www.userloser.net/images/zerobotcracked.png) But I'm pretty sure Sky doesn't use that same method anymore
Quote from: hismajesty[yL] on December 13, 2004, 01:48 PM
Quote from: iago on December 13, 2004, 08:27 AM
Doing it based on harddrive serial is useless, because they can just bypass that part of the code.
That applies to a lot of current methods. Think of those games that we cracked when you were teaching me to read Assembly.
I know, you can bypass ANY protection. There's nothing at all that you can do to stop it, just slow it down.
Quote
QuoteThe best way is just to make your software opensource, and release the entire thing publicly, encouraging others to work on it, and provide patches if they find a bug. It works surprisingly well.
Despite his reason, making it open source/freely available kinda defeats the point which is to keep it private...
My point is that keeping stuff private is stupid.
Regardless of your guy's opinions which I appreciate, not one person here has provided me with an authentication/protection method. If someone has a public one and wishes to share, please do so.
Quote from: Mephisto on December 13, 2004, 07:00 PM
Regardless of your guy's opinions which I appreciate, not one person here has provided me with an authentication/protection method. If someone has a public one and wishes to share, please do so.
Strong encryption based off of certain values returned from querying the user's system info
Quote from: Mephisto on December 13, 2004, 07:00 PM
Regardless of your guy's opinions which I appreciate, not one person here has provided me with an authentication/protection method. If someone has a public one and wishes to share, please do so.
I gave you a method.
Quote from: Mephisto on December 13, 2004, 07:00 PM
Regardless of your guy's opinions which I appreciate, not one person here has provided me with an authentication/protection method. If someone has a public one and wishes to share, please do so.
What have you come up with so far?
I explained it in an earlier post; HisMajesty, you gave me an idea to base it off of, not really a method of doing it. :)
My method, now that I don't have the source, was based on this:
Serial length: 21
Digits 1-3: Harddrive serial number length
Digits 4-X: Harddrive serial number
X-20: Random digits based off of the harddrive serial number
21: Digit calculated by a modified UPC algorithm
Nobody has cracked it yet. :)
Quote from: R.a.B.B.i.T on December 13, 2004, 07:34 PM
My method, now that I don't have the source, was based on this:
Serial length: 21
Digits 1-3: Harddrive serial number length
Digits 4-X: Harddrive serial number
X-20: Random digits based off of the harddrive serial number
21: Digit calculated by a modified UPC algorithm
Nobody has cracked it yet. :)
Send the app to
[email protected]
or
[email protected], if I have time :P
Or post it somewhere and I'll take a crack at it. I have some downtime coming up.
Isn't it fairly easy to crack applications that use a harddrive serial number?
Quote from: Mephisto on December 13, 2004, 08:27 PM
Isn't it fairly easy to crack applications that use a harddrive serial number?
Fairly easy to crack anything that's non-encrypted
Quote from: Kp on December 13, 2004, 08:11 PM
Or post it somewhere and I'll take a crack at it. I have some downtime coming up.
Hmm, inproc is where now? :p
Quote from: R.a.B.B.i.T on December 13, 2004, 07:34 PM
My method, now that I don't have the source, was based on this:
Serial length: 21
Digits 1-3: Harddrive serial number length
Digits 4-X: Harddrive serial number
X-20: Random digits based off of the harddrive serial number
21: Digit calculated by a modified UPC algorithm
Nobody has cracked it yet. :)
"ZakenNayo"?
[22:05:45.734] [AUTH] Decoding authorization key...
[22:05:45.734] [AUTH] Authorization key validated
[22:05:45.750] [AUTH] Verifying authorization database....
[22:05:45.750] [AUTH] Authorization database verified
[22:05:45.750] [AUTH] Sending authorization request...
[22:05:45.968] [AUTH] Authorization passed
[22:05:48.609] -- Error: Enter CD-Key
[22:05:48.609] -- Error: Enter home channel
[22:05:48.609] -- Error: Enter password
[22:05:48.609] -- Error: Enter username
/shrug
Swapped a few jz and jnz's~
haha ;D
You could create something like bnls with authentication and encrypt the stream using RSA. If this has nothing to do with a bot, then you could do the same thing but with the critical functions server-side.
Storing critical functions on a server will slow you down. In fact, why don't you store the entire program online? Just make the bot a series of encrypted calls to the server?
What is stopping somebody from breaking the authentication, and using your server for themselves, though? If you are using an encrypted stream, the client still has the ability to decrypt and use it, so that decryption code can be taken.
Quote from: iago on December 14, 2004, 09:48 AMStoring critical functions on a server will slow you down. In fact, why don't you store the entire program online? Just make the bot a series of encrypted calls to the server?
What is stopping somebody from breaking the authentication, and using your server for themselves, though? If you are using an encrypted stream, the client still has the ability to decrypt and use it, so that decryption code can be taken.
Ah, but if each client has its own unique authentication to the server, you can revoke individual clients when you realize what they're doing (similar to how CDkeys can be revoked from battle.net if they're caught causing too much trouble). Incidentally, I agree with your implication that this is taking it to an extreme.
Quote from: iago on December 14, 2004, 09:48 AM
Storing critical functions on a server will slow you down. In fact, why don't you store the entire program online? Just make the bot a series of encrypted calls to the server?
Depends on the application I suppose. But is a worthwhile and difficult measure to get past without alerting the creator someone is trying to break their application. This thread reminds of what when MousePad and the Javascript dude (forgot is name, he attached a javascript engine to D2) had this neeto encryption that they thought couldn't be broken and eventually it did.
The program has to necessarely decrypt itself to run, so there has to be a way to get around it.
Quote from: UserLoser on December 13, 2004, 10:09 PM
Quote from: R.a.B.B.i.T on December 13, 2004, 07:34 PM
My method, now that I don't have the source, was based on this:
Serial length: 21
Digits 1-3: Harddrive serial number length
Digits 4-X: Harddrive serial number
X-20: Random digits based off of the harddrive serial number
21: Digit calculated by a modified UPC algorithm
Nobody has cracked it yet. :)
"ZakenNayo"?
[22:05:45.734] [AUTH] Decoding authorization key...
[22:05:45.734] [AUTH] Authorization key validated
[22:05:45.750] [AUTH] Verifying authorization database....
[22:05:45.750] [AUTH] Authorization database verified
[22:05:45.750] [AUTH] Sending authorization request...
[22:05:45.968] [AUTH] Authorization passed
[22:05:48.609] -- Error: Enter CD-Key
[22:05:48.609] -- Error: Enter home channel
[22:05:48.609] -- Error: Enter password
[22:05:48.609] -- Error: Enter username
/shrug
Swapped a few jz and jnz's~
No, that has a crappy auth system. FoFoBot, which I sadly lost due to harddrive reformat, had the serial encryption.
http://cold-chaos.net/rabbit/FF_Full.exe or http://cold-chaos.net/rabbit/FF_Lite.exe are the installers for the old FoFoBot.
PS: ZakenNayo is public now, so there's no point to even cracking the serial.
[19:52:51] [AUTH] Failed (1): Serial not found. Request serial number with /reqser
[19:52:56] [AUTH] Passed (0): Serial request sent. Please wait for activation.
[19:53:36] [AUTH] Passed (1): Serial accepted.
[19:53:37] [AUTH] Passed (2): Your serial was accepted.
[19:53:37] BNET: Connecting...
[19:53:37] BNET: 10049: Address is not available from the local machine.
[19:53:37] BNET: Disconnected.
Ah..I turned off the auth system, which I just turned on again. Try now :)
[edit]
I also made this (http://www.rabbitsoftware.net/CrackMe.zip). It's based off of a new serial system I am making, it'd be nice to see if any of you can crack it.
[edit2]
Fixed.
Quote from: R.a.B.B.i.T on December 14, 2004, 08:31 PM
Ah..I turned off the auth system, which I just turned on again. Try now :)
[edit]
I also made this (http://www.rabbitsoftware.net/CrackMe.zip). It's based off of a new serial system I am making, it'd be nice to see if any of you can crack it.
Broken link.
Quote from: UserLoser on December 14, 2004, 08:57 PM
Quote from: R.a.B.B.i.T on December 14, 2004, 08:31 PM
Ah..I turned off the auth system, which I just turned on again. Try now :)
[edit]
I also made this (http://www.rabbitsoftware.net/CrackMe.zip). It's based off of a new serial system I am making, it'd be nice to see if any of you can crack it.
Broken link.
Looks ok here.
What happens when you crack it? Does it append a ":)" to the end of the first textbox? How do we know when it's cracked?
As UserLoser points out, we lack some information here, but I think this is probably it:
(http://www.valhallalegends.com/arta/CrackMe.jpg)
Yes, I know it can be cracked by changing a JMP or something, but I was aiming for you to make it work with valid serials by figuring out how the serials WORKED, not by changing a command.
Quote from: R.a.B.B.i.T on December 15, 2004, 03:41 PM
Yes, I know it can be cracked by changing a JMP or something, but I was aiming for you to make it work with valid serials by figuring out how the serials WORKED, not by changing a command.
Why? You have to watch out for both. The best way is to encrypt a series of commands, and the only way to decrypt them is with a valid key. That why, they can't change a jump.
Quote from: R.a.B.B.i.T on December 15, 2004, 03:41 PM
Yes, I know it can be cracked by changing a JMP or something, but I was aiming for you to make it work with valid serials by figuring out how the serials WORKED, not by changing a command.
Why would anyone go to that kind of trouble?
Quote from: Arta[vL] on December 15, 2004, 04:21 PM
Quote from: R.a.B.B.i.T on December 15, 2004, 03:41 PM
Yes, I know it can be cracked by changing a JMP or something, but I was aiming for you to make it work with valid serials by figuring out how the serials WORKED, not by changing a command.
Why would anyone go to that kind of trouble?
I like doing that because it typically lets me install future upgrades of the program without any additional work....
Quote from: Adron on December 15, 2004, 04:32 PM
Quote from: Arta[vL] on December 15, 2004, 04:21 PM
Quote from: R.a.B.B.i.T on December 15, 2004, 03:41 PM
Yes, I know it can be cracked by changing a JMP or something, but I was aiming for you to make it work with valid serials by figuring out how the serials WORKED, not by changing a command.
Why would anyone go to that kind of trouble?
I like doing that because it typically lets me install future upgrades of the program without any additional work....
By fingerprinting the code, you can usually do that anyway, unless they make changes to the algorithm. And if they change the algorithm, your keygen won't work either.
I usually keep 1 algorithm for each series of programs, and I only change it if I know it's been cracked. I think I should start changing my aglorithims each release now -.-
Won't make any difference :)
Quote from: R.a.B.B.i.T on December 16, 2004, 04:01 PM
I usually keep 1 algorithm for each series of programs, and I only change it if I know it's been cracked. I think I should start changing my aglorithims each release now -.-
It wouldn't make a difference if the hacker figured out how to bypass the algo altogether.
Quote from: R.a.B.B.i.T on December 16, 2004, 04:01 PM
I usually keep 1 algorithm for each series of programs, and I only change it if I know it's been cracked. I think I should start changing my aglorithims each release now -.-
Should look into your own encryption/scrambling system if you want it to be more secure. By secure, I mean take more effort to crack; rather than modifying about 3 bytes of your code in the executable
Is it possible to do encryptions like that for VB programs? I'm assuming that RaBBiT is using VB, and I know VB is really limited (much like Java) for low level stuff like that.
Quote from: iago on December 16, 2004, 05:31 PM
Is it possible to do encryptions like that for VB programs? I'm assuming that RaBBiT is using VB, and I know VB is really limited (much like Java) for low level stuff like that.
You could do a simple encryption with a stub program, I imagine: encrypt the entire program by doing something simple like XORing each byte with an arbitrary byte such as 0x6f or something. Then prepend a stub that loads the data, decrypts it, and jumps to where the actual entry point *should* be.
Quote from: MyndFyre on December 16, 2004, 05:33 PM
Quote from: iago on December 16, 2004, 05:31 PM
Is it possible to do encryptions like that for VB programs? I'm assuming that RaBBiT is using VB, and I know VB is really limited (much like Java) for low level stuff like that.
You could do a simple encryption with a stub program, I imagine: encrypt the entire program by doing something simple like XORing each byte with an arbitrary byte such as 0x6f or something. Then prepend a stub that loads the data, decrypts it, and jumps to where the actual entry point *should* be.
A system like that is equally as weak. I could just convert the descrambling code into an IDC script and run it on scrambled sections.
Quote from: Eibro[yL] on December 16, 2004, 06:28 PM
A system like that is equally as weak. I could just convert the descrambling code into an IDC script and run it on scrambled sections.
Yes I know. That's why I said "You could do a
simple encryption." The point was that it would be possible, not the strength of the scheme of protection.
Should encrypt the exe on disk, and use code modification in-memory to randomly scramble around program flow.
Quote from: MyndFyre on December 16, 2004, 05:04 PM
Quote from: R.a.B.B.i.T on December 16, 2004, 04:01 PM
I usually keep 1 algorithm for each series of programs, and I only change it if I know it's been cracked. I think I should start changing my aglorithims each release now -.-
It wouldn't make a difference if the hacker figured out how to bypass the algo altogether.
It would change the place where the jump occured, however!
Quote from: R.a.B.B.i.T on December 19, 2004, 09:56 PM
Quote from: MyndFyre on December 16, 2004, 05:04 PM
Quote from: R.a.B.B.i.T on December 16, 2004, 04:01 PM
I usually keep 1 algorithm for each series of programs, and I only change it if I know it's been cracked. I think I should start changing my aglorithims each release now -.-
It wouldn't make a difference if the hacker figured out how to bypass the algo altogether.
It would change the place where the jump occured, however!
So? Then all someone has to do is disassemble it or do what they did the first time to find it
True, but it does get annoying to decompile and change the program every time. Cracking the serial would work until the algorithm would change.
it would take prolly 5 min to crack that protection.
I never said it was the best, or even GOOD. It was just an example.
Yes, it is possible-- although quite ugly! The key to doing it is a v-table hack & signatures. We use the v-table hack so that we can write our scramble/descramble encrypt/decrypt in assembly. Then the assembly needs signatures, since we can't do inline assembly we give the scramble/descramble encrypt/decrypt a dummy parameter and we pass something obvious like 0x12345678 or 0xBADBEEF, something our routines can scan for to know where to stop at. It also requires a bit more for signatures using this method because the signatures will be pushed onto the stack before the call, etc.
Dim m_objProtection as new clsProtection
Private Sub Form_Load()
Set m_objProtection = new clsProtection
End Sub
Private Sub DoMath()
Dim lngX as long, lngY as long
Call m_objProtection.Decramble(&H12345678)
lngX = 1
lngY = 1
lngX = lngX + lngY
Call m_objProtection.Scramble(&H87654321)
End Sub
Private Sub Form_Unload(ByRef Cancel as Integer)
Set m_objProtection = Nothing
End Sub
Nice to see you got that working in the end :)
Nice to see I didn't have to write the scrambling part after all. :)
Four things. EDIT: Five.
iago:
QuoteI completely agree, some things are destructive.
My point is that keeping stuff private is stupid.
I think he forgets pretty fast, if you ask me.
UserLoser:
Quote"ZakenNayo"?
FoFoBot, although RaBBiT already said. ^^
Mephisto: I would have a list of authorized names somewhere and then access that list, and if CrLf, the name, and then CrLf is in the list, then their authorized. I know its easily crackable, but its what Stealth uses, plus checking for the end of his lines. I haven't tried, but from seeing the StealthLock code, you could pass the authorization by using the middle of an authorized name as your name, unless he upgraded it to check for vbCrLf's too.
RaBBiT: I'm guessing your saying "Heres FoFoBot, now crack it. See if I care.", right?
EDIT:
Fifth and finally, page break!
Pretty much, considering I set the auth to a BNLS similar way (before BNLS converted). If your info works, you get a valid logon response. If it doesn't or is just completely absent you get the "I don't give a fuck, logon anyways" message.
Quote from: rabbit on January 29, 2005, 05:54 PM
Pretty much, considering I set the auth to a BNLS similar way (before BNLS converted). If your info works, you get a valid logon response. If it doesn't or is just completely absent you get the "I don't give a fuck, logon anyways" message.
Which means that to "hack" your bot, you'd make an entry in the hosts file?
And people always tried decompiling. The simplist method usually works best :)
There is one way, making a seperate bot connect on form_load with the user not knowing, and if you see its somebody you dont know, make it shutdown, and the way you can do that is
Make the bot look at a website with a txtdocument with something like "DOWN", if its there, bot will stay up, if it isnt the bot will shutdown, easy ?
Quote from: QwertyMonster on February 04, 2005, 08:32 AM
There is one way, making a seperate bot connect on form_load with the user not knowing, and if you see its somebody you dont know, make it shutdown, and the way you can do that is
Make the bot look at a website with a txtdocument with something like "DOWN", if its there, bot will stay up, if it isnt the bot will shutdown, easy ?
Then all someone has to do is change their hosts file so the bot will use a text document on localhost rather than your website.
Hmm, this may be a bad method since it will consume bandwidth and time, but to me it surely sounds safe if you understand what I'm trying to say :)
User gets the executable which is scrambled based off of a unique key decided from program which gets info about the user's computer. The executable is compiled like normal & server adds this version of executable into it's database, then using another application it scrambles all of the contents except the code which grabs the unique key for the user's system. The executable contains no decryption, unscrambling, scrambling, or encryption code at all. The executable is forced to connect to the "auth server" which everything is done. The executable sends the server the key, and the server unscrambles the defined executable (gets the file contents from the database) based on the key sent, and then the server sends back all of the unscrambled data (valid or not) to the program and it just writes over the useless scrambled junk. Continue execution of program.
So pretty much there is no way to unscramble any of the code (it's basically just dummy bytes that will get overwritten) unless you connect to the correct server. The server cannot be rerouted (nobody will know how to write a server which performs the required tasks), modifying hosts file will not help in anyway, so that's good i guess.
Write a hook function that intercepts the area of the executable where the decrypted code is received and written to memory. Save the decrypted code along with an offset that defines where it goes. Start replacing encrypted sections with the decrypted data, without removing the decryption mechanism on areas that are still encrypted. Use the program thoroughly. Eventually, all sections should be decrypted.
Alternatively, make a list of all encrypted sections and the encrypted data, write a client for the auth server, request that it decrypt all of them, write them to the .exe, and bingo.
If your secure executable is being replaced, UL, wouldn't the original leaker just leak the already descrambled version?
How about this:
Your app is a device driver. When it smells trouble (debugger etc), it does some whacko hardware error so you can't debug it. Ensure it's always in memory and locked in the filesystem, too.
Quote from: Banana fanna fo fanna on February 05, 2005, 02:28 PM
How about this:
Your app is a device driver. When it smells trouble (debugger etc), it does some whacko hardware error so you can't debug it. Ensure it's always in memory and locked in the filesystem, too.
Lots of games do something similar to foil people using virtual drives to play the games. All of them that I've played have been cracked irregardless though, and most Softice detecting stuff has been foiled too.
Hmm i have another idea.
Ask Stealth How he makes hes bot show its time for update when outdated, but switch it around to see when an invalid user connects (One you dont know) and make it shutdown.
But maybe Stealth will be mean and not tell you, but worth a try? :/
i am pretty sure they already know how to do that if they know winsock and it be pretty easy to bi-pass it all u need to do is put a jump where it checks the website
Quote from: QwertyMonster on February 06, 2005, 12:45 PM
Hmm i have another idea.
Ask Stealth How he makes hes bot show its time for update when outdated, but switch it around to see when an invalid user connects (One you dont know) and make it shutdown.
But maybe Stealth will be mean and not tell you, but worth a try? :/
That system and the beta authorization system have almost no security at all to them. They can be hijacked with a simple hosts-file redirect or a variety of other methods.
The fact that non beta users dont have SB Beta and he only picks honest people is most likely the reason he wont break his back writing a good Authentication system.
Lol, well an easy Authentication that can be hijacked easy seems to be working good. To me it looked good, until now you told me! :P
Most Auths can be bypassed by jumping where it comes out incorrect to where it comes out correct by editing a few bytes. But like stated earlier it depends who are the people who use your Bots and if they know how to bypass your Authentication, unless you plan on distributing your product to the masses and have alot of smart enemies I dont think you need to have a super secure Authentication
Well, as I have learned, generally any authentication which does not use encryption can be easily bypassed (though there are certain things you can do to make it very tedius work for the hacker to bypass your authentication such as having 50 checks made in different ways and in different places; though the user could just figure out your authentication method and bypass all those, but you could make your authentication via a server instead of locally which cancels out that idea).
What you people might be missing is that everything needed to make a successful connection to the server is there in the executable. Whether it's just a simple data encryption handshake, or the code necessary to download an alternate program to be stored in memory, all it takes is time before someone will crack it.