![]() |
![]() |
![]() |
![]() |
![]() |
||||||||||
|
||||||||||||||
![]() |
#11
|
|||
|
|||
![]() Quote:
|
#12
|
|||
|
|||
![]() Quote:
here is the deflowed .Net Reactor v3.7.9.1 http://momupload.com/files/92305/dp_...or-rb.rar.html the remaining protection is only the name obfuscation. strong name can be removed easily, and also can be faked.
__________________
interest in .NET Reverse Engineering. Blog: http://jithook.blogspot.com/ .Net Assembly Rebuilder - a tool to rebuild dumped assemblies. Re-Max - a tool to unpack maxtocode protected assemblies. |
#13
|
|||
|
|||
![]() Thanks for all your analysis bigmouse. Other than DNGuard (which has compatibility issues) it seems that most protectors are easily dumped. How does the obfuscation in .NET Reactor hold up to say CodeVeil? Or Spices.NET ?
You said the control flow obfuscation is weak; which has the best right now? It seems maybe Dotfuscator? Regards, Hannibal |
#14
|
|||
|
|||
![]() Quote:
Quote:
Quote:
Dotfuscator seems do do a good job, however, it is far to expensive for my budget. What interests me most at the moment is indeed the spices obfuscator. They explicitly don't use control flow obfuscation because it can be easily reversed (as we saw already). Instead they use cross obfuscation and a technology which allows it to even strip out most "system calls" like "Console.out" or "MessageBox.Show" for example. They also claim that this makes restoring the original code almost impossible. I don't know how much protection this technology (among others) is able to deliver, so I ask you, the pros. It could also help examingning some .Net Programs (you can see the spices attribute with reflector if the program is protected wth it) and examine if cracks exists. If I find some programs I'll post them here. Regards, Andu |
#15
|
|||
|
|||
![]() Quote:
assembly protected by dnguard previous version, works fine under vista. Quote:
also can be deflowed. http://jithook.blogspot.com/2008/04/...cation-of.html Quote:
can be restored by using method inline optimize.
__________________
interest in .NET Reverse Engineering. Blog: http://jithook.blogspot.com/ .Net Assembly Rebuilder - a tool to rebuild dumped assemblies. Re-Max - a tool to unpack maxtocode protected assemblies. |
#16
|
|||
|
|||
![]() Hi bigmouse,
what is this "method inline optimize" you're talking about? If you or someone elese has already cracked commercial targets protected with spices obfuscator, how hard is it or rather, what's your "conversiation rate" (targets / sucessfull crack). Regards, Andu |
#17
|
|||
|
|||
![]() Inline Method
Put the method's body into the body of its callers . int getRating() { return (moreThanFiveLateDeliveries()) ? 2 : 1; } boolean moreThanFiveLateDeliveries() { return _numberOfLateDeliveries > 5; } ====> int getRating() { return (_numberOfLateDeliveries > 5) ? 2 : 1; }
__________________
interest in .NET Reverse Engineering. Blog: http://jithook.blogspot.com/ .Net Assembly Rebuilder - a tool to rebuild dumped assemblies. Re-Max - a tool to unpack maxtocode protected assemblies. |
#18
|
|||
|
|||
![]() Quote:
Not hard. |
#19
|
|||
|
|||
![]() Thanks for clarifiing Bigmouse!
Quote:
Regards, Andu |
#20
|
|||
|
|||
![]() Andu -
A quick google search turned up a number of versions; this being the most recent: 9Rays.Spices.Net.v5.1.2.0.Patched.incl.Keygen-FPE Thanks for the tip jfx! Regards, Hannibal |