Jump to content
Tuts 4 You

Anti-Reverse Engineering (Assembly Obfuscation)

Teddy Rogers

Recommended Posts

Anti-Reverse Engineering (Assembly Obfuscation)

The purpose of this paper is to demystify the .NET assembly obfuscation as a way to deter reverse engineering. The primary concern for organizations is typically protecting their source code (as intellectual property) from reverse engineering. Obfuscation is a tactic that provides unified retitling of symbols in assemblies as well as other tricks in order to foil decompilers. Properly applied obfuscation increases protection against disassembling and decompilation by orders of magnitude, while leaving the application undamaged. A cracker can utilize the sensitive information from decompiled or disassembled code easily, so this article given a detail analysis of both obfuscated and de-obfuscated code.





Link to comment
Share on other sites

About the Author: Ajay Yadav

Ajay Yadav is a technocrat professional with eight years experience on multi-faceted profiles, including Subject Matter Expert, Penetration Tester, Cyber Security Analyst, Software Engineer and Instructor. Presently he is serves the Indian IT ministry in a top position.

<flamebait>Oops. Somehow I feel sorry for the Indian government..</flamebait>

Link to comment
Share on other sites

haha, nice tutor on how to use dotfuscator :P

Here is another tutor for you, this time on deobfuscating(!!!):

1) Download de4dot


2) Do commandline 'de4dot filename.exe'


3) so much win!


EDIT2: thanks for the effort of posting this anyway Ted!

EDIT3: ahh, even more interesting stuff: http://resources.infosecinstitute.com/applied-cracking-byte-patching-ida-pro/

Edited by Mr. eXoDia
  • Like 1
Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Create New...