We are all looking for a long time. A method that fully protects code security. Countless tools and solutions are used. In powerful Il and decompilation and shelling, yundun is stabbed under the spear.
Recently, the author has been suffering from headaches, but has combined some previous solutions. I came up with a new solution.
OK. To put it short, the practice is quite simple.
Most shelling methods on the Internet are to put programs or libraries
In the previous chapters, we have been able to remove encrypted data.ProgramThe original il bytecode. These bytecode are hexadecimal, and it is very difficult for my brain to read them directly. This chapter describes how to translate bytecode into readable msil compilations.CodeAnd the solutions to the issues left over in the previous chapters.
Here we will use the above tool software ilbytedecoder.
Software: http://www.bbsftp.com/temp/ILByteDecode
. Net profiling
. Net internals: The profiling API
Rewrite msil code on the fly with the. NET Framework profiling API
. Net internals and code injection
Really easy logging using IL rewriting and the. NET profiling API
Modifying Il at runtime (1, 2, 3)
Patch the. NET program with memory
Creating a custom. Net profiler
Use the. NET Framework profiling API to quickly rewri
There are many articles on ref and out in C #. This article mainly analyzes the nature of out parameters from Il.
Directory
Out = ref + parameterattributes. Out
Call the ref and out methods through reflection
Emit build out or ref Parameters
Returned directoryOut = ref + parameterattributes. Out
Let's look at two out and ref methods.
Static void test_ref (ref int I)
{}
Static void test_out (Out int I)
{I = default (INT );}
Use Mono.cecil to save the Times "Failed to resolve assembly: ' xxxxxx, Version=xxxxx,culture=xxxxx," for the Il modification of the target. NET DLL program. Publickeytoken=xxxxxxx ' "Exception.Debug with Dnspy, originally because the modified target DLL and its own program is not the same directory, when it is necessary to use the DLL referenced by the target DLL when the Mono.cecil only in their own directory for the search match,If the correspondin
Reflector, reflexil, De4Dot, IL command quick query table, reflexilde4dot
Http://files.cnblogs.com/files/quejuwen/ReflectorInstaller.rar
Http://files.cnblogs.com/files/quejuwen/ReflectorCrack.rar
Http://files.cnblogs.com/files/quejuwen/reflexil.zip
Http://files.cnblogs.com/files/quejuwen/de4dot-v3-1.zip
Name
Description
Add
Add two values and push the results to the computing stack.
Add. Ovf
Add the two integers,
method before executing the actual calling instruction.
Throw
Throws the exception object that is currently on the evaluation stack.
Unaligned
Indicates that the address currently on the evaluation stack may not be aligned with the natural size of the immediately ldind, stind, ldfld, stfld, ldobj, stobj, initblk, or cpblk directives.
Unbox
Converts the boxed representation of a value type to its unboxed form.
Unbox.any
not be aligned with the natural size of the immediately ldind, stind, ldfld, stfld, ldobj, stobj, initblk, or cpblk directives.
Unbox
Converts the boxed representation of a value type to its unboxed form.
Unbox.any
Converts the boxed representation of a specified type in an instruction to an unboxed form.
Volatile
Specifies that the address currently on top of the evaluation stack can be volatile, and that the result of reading that locat
Title: Two people take turns in the n*n of the parallelogram lattice into black and white two-color pieces,If the black side can give the creation of a continuous line from 1~n lines then black wins, otherwise white wins.Analysis: Graph theory, search. Use DFS or FloodFill solution to find solutions that can reach the low end from the top.Description: Target 600 question ╮(╯▽╰)╭.#include UVa 260-il gioco dell ' X
Improve the real-time performance of IJLC/OS n and Il with coprocessor
[Date: 2008-10-7]
Source: single-chip microcomputer and Embedded System Application Author: Tsinghua University Feng Zedong Shao Beibei
[Font:Large Medium Small]
IntroductionμC/OS-II supports a maximum of 63 tasks and multiple inter-process communication mechanisms such as semaphores, mailboxes, and message queues. At the same time, users can crop the functio
Some il language explanations:
Jump command set
Public field static beq if the two values are equal, the control is transferred to the target command.Public field static beq_s if the two values are equal, the control is transferred to the target command (short format ).Public field static Bge if the first value is greater than or equal to the second value, the control is transferred to the target command.Public field static bge_s if the first value
This articleArticleThe IL language is used to explain the different parameters passed at the top of the stack when the static method and the non-static method are called.First, take a lookCode:Class testclass{Public static readonly int I = 10;Static void main (string [] ARGs){Testclass = new testclass ();Teststatic ();Testclass. nonstatic ();}
Public static void teststatic (){}
Public void nonstatic () {
After decompilation, we will get the follow
1.3.2 Meta data
Metadata is the data that describes the data. In the context of the CLR, the metadata represents a set of systems consisting of descriptors that include all the items declared or referenced in a module. Because the CLR model is
Name
Description
Add
Add two values and push the results to the computing stack.
Add. ovf
Add the two integers, run the overflow check, and push the results to the computing stack.
Add.
12.2Chapter 2Examine translation for analysis should be unifiedFull name translation should be unified, and full class name should also be unified.Nested translation should be unifiedPower or translate to multiplication partyCheck the binary
Returned directory
Summary
Now that you know how metadata is organized in principle, you have to prepare tables that detect these specific metadata items and represent them. All further considerations will be focused on4Metadata data streams
Returned directory
Summary
Discussed the structure andIlHow the compiler generates these filesIlThe compiler creates a managedPEFile steps.PEThe file is created as follows:4Steps:
Procedure1: Initialization
1.Initialize internal
Zoj 1710Thesnail
Http://acm.zju.edu.cn/onlinejudge/showProblem.do? Problemid = 710
A snail bait crawls a little during the day and drops it by a given percentage. Shows the depth of the well, the number of meters per day, and the percentage of
Name
Description
Add
Adds two values and pushes the result onto the evaluation stack.
add.ovf
Adds two integers, performs an overflow check, and pushes the result onto the evaluation stack.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.