Bob Dole Posted October 16, 2017 Posted October 16, 2017 (edited) Suppose you have a data file in your protected software (assume it's protected by something like VMP or Themida) that you don't want a user to tamper with. You conclude that you will embed information into this data file which your program will use, i.e., initiate constants using this data as some kind of initial value. However, this can be bypassed relatively easily if the cracker (a) knows you're doing this to a specific data file and (b) can debug your program to fish out these constants. Then simply replaces your data file and writes a loader to overwrite these constants with the fished data. Is there anything that can be done to make this even more difficult for the cracker to replace? Edited October 16, 2017 by Bob Dole
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now