![]() |
![]() |
![]() |
![]() |
![]() |
||||||||||
|
||||||||||||||
![]() |
#51
|
|||
|
|||
![]() Quote:
which can resovle this problem , it would be the good one. frequently update is not necessary.stable is important. to follow each update, you will need to reprotect and redistribute your assemblies. especially, if protector's udpate period close to your product's , i will be very nice. only protectors which offen been cracked need to update frequently.
__________________
interest in .NET Reverse Engineering. Blog: http://jithook.blogspot.com/ .Net Assembly Rebuilder - a tool to rebuild dumped assemblies. Re-Max - a tool to unpack maxtocode protected assemblies. |
#52
|
|||
|
|||
![]() Thanks fpr your comments and clarifing the interna bigmouse.
@rongchaua, thanks for pointing to the video. I think I know it already (if it shows breaking application mode). It's shocking how easily it can be done. It's nice you're investigating library mode. How difficult is it to break in your opinion? What interests me most is if it is possible to unpack it statically and if a tool can be written to do this. Because if that would be the case the protection is completely gone. On the other hand, if it has to be done by hand and one has to fix a lot of things it could be unpractical for normal projects (and not little crackme's ![]() What do you think about the strong name removal protection? Can it provide any more security? Yeah, and because im personally interested in protections myself it would be nice if you could share some details. Seems like DnGuard is the way to go at the moment... I'll see if it still is uncracked as my release date comes closer. I think the biggest problem is that there is (or seems at least) no cracked DnGuard version available with full protection so you guys can't test it... Regards, Andu |
#53
|
|||
|
|||
![]() @Andu
you can post a library mode sample here. if you want to try out dnguard. here has dnguard Standard Editon V2.6 's sample. http://www.tuts4you.com/forum/index.php?showtopic=14132 you can also try it newest trial version v2.9. as its standard edition really encrypt the ilcode, so forgot to search ilcode from assembly module. here i post a way to bypass DNGuard trial's 30 days limit http://jithook.blogspot.com/2008/04/...ays-limit.html in my opinion obfuscation is enough for most .net product. for most large companys ,they even didn't need obfuscation.
__________________
interest in .NET Reverse Engineering. Blog: http://jithook.blogspot.com/ .Net Assembly Rebuilder - a tool to rebuild dumped assemblies. Re-Max - a tool to unpack maxtocode protected assemblies. Last edited by bigmouse : 04-29-2008 at 07:31 AM. |
#54
|
||||
|
||||
![]() Hi bigmouse,
Quote:
![]() Quote:
But what's about this additional encryption anyway? It can't be dumped as a whole from memory, ok, but it should be a symmetrical encryption and if you can find the key (which has to be somewhere) you can statically unpack it. Right? So we can limit the problem on finding this key. Right? Quote:
Quote:
![]() Regards, Andu |
#55
|
|||
|
|||
![]() Quote:
suppose the methodcode was encrypted, don't intend to search methodcode from assembly module. Quote:
you can try to static unpack maxtocode protected assemblies. as they used many encryption algorithms, choose random one to encrypt each method. static unpack is not as easy as you think. there program are native exe, also been protected. it's very hard to analyse all it's encryption algorithms. why .Net Reactor, xenocode studio protected assemblies been static unpacked? 1. themselves are .net program. 2. themselves been unpacked first. a protector's soucecode is available to crackers, you can imagine what does its protection mean. Quote:
__________________
interest in .NET Reverse Engineering. Blog: http://jithook.blogspot.com/ .Net Assembly Rebuilder - a tool to rebuild dumped assemblies. Re-Max - a tool to unpack maxtocode protected assemblies. |
#56
|
|||
|
|||
![]() Hi bigmouse,
Quote:
Quote:
|
#57
|
|||
|
|||
![]() That doesn't matter, they can't sue u anyway if they do i have a shitload of proof they stole and used GPL and other free code while thats not alowed according to the license :P
|
#58
|
|||
|
|||
![]() .net reactor 3.7.1.0 unpacked
http://momupload.com/files/91593/dp_...actor.rar.html itself can be easily unpacked. if the library mode is more security, why they didn't use this to protect itself.
__________________
interest in .NET Reverse Engineering. Blog: http://jithook.blogspot.com/ .Net Assembly Rebuilder - a tool to rebuild dumped assemblies. Re-Max - a tool to unpack maxtocode protected assemblies. |
#59
|
|||
|
|||
![]() Quote:
![]() Quote:
|
#60
|
|||
|
|||
![]() Quote:
![]()
__________________
interest in .NET Reverse Engineering. Blog: http://jithook.blogspot.com/ .Net Assembly Rebuilder - a tool to rebuild dumped assemblies. Re-Max - a tool to unpack maxtocode protected assemblies. |