Lick it.
Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ
⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.
Rules • Full Version
1. Posts must be related to the discussion of digital piracy
2. Don't request invites, trade, sell, or self-promote
3. Don't request or link to specific pirated titles, including DMs
4. Don't submit low-quality posts, be entitled, or harass others
Loot, Pillage, & Plunder
📜 c/Piracy Wiki (Community Edition):
🏴☠️ Other communities
FUCK ADOBE!
Torrenting/P2P:
- !seedboxes@lemmy.dbzer0.com
- !trackers@lemmy.dbzer0.com
- !qbittorrent@lemmy.dbzer0.com
- !libretorrent@lemmy.dbzer0.com
- !soulseek@lemmy.dbzer0.com
Gaming:
- !steamdeckpirates@lemmy.dbzer0.com
- !newyuzupiracy@lemmy.dbzer0.com
- !switchpirates@lemmy.dbzer0.com
- !3dspiracy@lemmy.dbzer0.com
- !retropirates@lemmy.dbzer0.com
💰 Please help cover server costs.
![]() |
![]() |
---|---|
Ko-fi | Liberapay |
You again? GET OUT OF MY CAR!
AFAIK, you don't. You might be able to validate the actual software package's hash against official sources, but the crack won't validate because it's different from the unedited files.
That's why picking a site and uploader you know is important. You're kind of just hoping for the best.
I mean, is it safe to assume that the torrent from megathread > monkrus > uztracker is safe? I've read that you either go genp or monkrus for less chance of malware.
Alternatively, do you think splitting the 37.5GB file into 650MB pieces and then scanning with virustotal would do much good?
M0nkrus is probably safe, that's why people recommend them so frequently.
I lack the technical knowledge to say whether splitting the file to scan would work or not, but I suspect not.
Validate the checksum against the official sources.
Wouldn't it be different since non-official versions are cracked? I'm also not really sure how I would even do so for that plugin since it is a subscription, nor how to do so for the master collection, because it technically does not exist officially.
Honestly, the safest move is to keep these files totally separate from your personal stuff. Running them in a VM or dedicated hardware is really the only way to avoid getting hacked.
Run it inside a VM? If you're suspicious or just worried, this would resolve most if not all of possible worries you may have.
This is what I do. I have a VM for torrents and a VM sandbox to check stuff that I'm concerned about. At the host level I disable any type of sharing with the host, no copy paste, no sharing disks, nothing. The VM only gets the storage I assign to it and once I validate then I'll detach and mount it to the host.
Hey thank you for the info. Which VM do you use? How do you disable the various types of sharing with the host? Also, how do you validate? Sorry for all the questions, but that seems like it may be my only option
I use Hyper-V because I run server 2022 and it's free. Hyper-V allows you to disable any host resource sharing in the VM settings.
On my sandbox VM I'll scan the files then install and scan, then run the software and scan. I use both defender and I think malwarebytes. It's a lot of extra work for no gain, but I'd rather be too careful than risk installing malware.
Note that sophisticated malware [attempts to] identify whether it is running in a VM / testbed / analysis scenario and may behave and look different between that runtime scenario and "normal use".
Analysis in a VM may not be sufficient to determine whether it is safe outside of it.
If it detects that it is in a VM and doesn't activate the malware, then I'm perfectly okay just using the software inside the VM.
Thank you for the detailed response. Just to confirm, is Hyper-V your sandbox VM? I used ESET to scan the files I torrented, but they look very suspicious from virustotal, but I don't really know how to parse the info - knowing if it is a false positive/etc.
Hyper-V is the hypervisor that the VM runs on. Yeah I don't really know which malware scanners are the go to ones anymore. Just figure if I can get it to pass through 2 different ones ok then it's probably ok. I'm sure there's some other good ones out there. I've heard of ESET and virustotal, but I'm not familiar.
Do you know of any guides to set up Hyper-V for this type of purpose? I want it to be as secure as can be: "disable any type of sharing with the host, no copy paste, no sharing disks, etc."
How would I know if there was hidden spyware/malware if I ran it in a VM? (if they are smart they try to be undetected)
You don't, but if someone figured out how to do a VM escape surely they would have bigger aspirations than some random torrent
I mean yeah that makes sense, but I don't know enough about torrenting (nor tech in general) to know if something is safe/trustworthy sadly.. I feel like I'm probably better off spending several hundreds on a subscription, than more likely than not be hacked/get advanced spyware. I doubt they wouldn't prey on dumb people like me if it is easy. If I was more knowledgeable it would probably be possible to manually remove infected bits of a torrented file to make it work, but idk.
If you find torrenting and running a VM too technical, I'm sorry to say you're better off not trying to identify and remove any malicious code.
Don't put yourself down and waste your money, you can get over the learning curve for this, it's not that steep.
To elaborate, as the previous reply stated, running the cracked programs inside a virtual machine allows you to isolate an environment specifically for this usage. Configured properly (another reply went into more detail here), even if the cracked software has something malicious, it can't harm you. So you can safely ignore wether there's a virus or not.
Thank you for the info, and for the encouragement. Yeah I am definitely going to try using a VM to diagnose the files more closely. To confirm, is a VM, (such as Hyper-V) similar to Windows Sandbox, where it effectively resets itself (new slate) each time you open it? Or can I install the torrented files in the VM and still access it if I close and reopen the VM in the future?
Also, which VM would you suggest? I apologize for appending so many questions to my original post.
What about installing some antivirus than can scan on demand?
I don't know how's the "market" right now, but a few years ago Malwarebytes was good for Windows, and ClamAV in Linux
That's what https://virustotal.com/ is for.
This was the result: https://imgur.com/a/5rEpIga I'm not sure if that means that it is safe/unsafe, but it seems extremely suspicious.
I ran my antivirus on the plugins.zip folder and it didn't detect anything. Then I ran it on the master collection folder, and it also didn't detect anything, but it suspiciously finished almost immediately although it does only contain the iso (37.5GB), .info file (2.46KB), .sha (85B), .md5 (77B), so I'm not sure. Also, I just posted the virustotal results in this thread.
You may have to mount the iso first before a virus scanner would scan it. Which I would advise against doing on a machine you care about. And even then, it might not scan the suspect files anyway, a lot of scanners will only check files with certain extensions.
Otherwise you could just run it in a virtual machine with no network connections and see if anything sus happens. But it might not happen right away, or it might detect the VM and not trigger any malware.
These are ways you can gather information to make an informed decision, but ultimately you may just have to decide whether you trust the source enough to roll the dice. Only you can make that decision.
If I use the VM with no network connections, is there any way for me to manually find malware hidden in the files? I'm not really sure what to look for specifically. I definitely want to try using a VM to more closely inspect the files
This is way outside of my expertise. I'm not sure you'd find anything VirusTotal's behaviour checks didn't find, anyway. Usually, if I'm at all unsure, I just won't run it.