Posted December 4, 201311 yr Anti-Reverse Engineering (Assembly Obfuscation) The purpose of this paper is to demystify the .NET assembly obfuscation as a way to deter reverse engineering. The primary concern for organizations is typically protecting their source code (as intellectual property) from reverse engineering. Obfuscation is a tactic that provides unified retitling of symbols in assemblies as well as other tricks in order to foil decompilers. Properly applied obfuscation increases protection against disassembling and decompilation by orders of magnitude, while leaving the application undamaged. A cracker can utilize the sensitive information from decompiled or disassembled code easily, so this article given a detail analysis of both obfuscated and de-obfuscated code. http://resources.infosecinstitute.com/anti-reverse-engineering-assembly-obfuscation/ Ted.
December 5, 201311 yr About the Author: Ajay Yadav Ajay Yadav is a technocrat professional with eight years experience on multi-faceted profiles, including Subject Matter Expert, Penetration Tester, Cyber Security Analyst, Software Engineer and Instructor. Presently he is serves the Indian IT ministry in a top position. <flamebait>Oops. Somehow I feel sorry for the Indian government..</flamebait>
December 7, 201311 yr haha, nice tutor on how to use dotfuscator Here is another tutor for you, this time on deobfuscating(!!!): 1) Download de4dot 2) Do commandline 'de4dot filename.exe' 3) so much win! EDIT2: thanks for the effort of posting this anyway Ted! EDIT3: ahh, even more interesting stuff: http://resources.infosecinstitute.com/applied-cracking-byte-patching-ida-pro/ Edited December 7, 201311 yr by Mr. eXoDia
Create an account or sign in to comment