. Net Program obfuscation, security, protection, encryption

Source: Internet
Author: User
Tags reflector

Link: http://www.svnhost.cn/Article/Detail-173.shtml

 

Decompilation tool:. net decompilation tool reflector tool. NET Reflector plug-in FileDisassembler

Everyone knows that software developed by. net is compiled into dll or exe files at the time of release, regardless of the WebForm project or WinForm project. However, we often want to view the software source code and lift some restrictions for learning or other purposes. At this time, the decompilation technology will come in handy. The reflector mentioned above is such a tool.

It can decompile the dll, exe, and other target files into the source code. If the target file is not obfuscated or encrypted, the source code obtained by decompilation is almost the same as the source code before software compilation. This poses a serious risk to the copyright and security of the program.

There is also a toolILDASMYou can decompile the target file into the IL source code. Then we can modify the IL source code and then useILASMCompile the IL source code to obtain a modified target file, which removes some restrictions of the program, such as the time limit and the number of times of use.

So how can we protect our programs from being modified?

During the past two days, compilation, decompilation, and obfuscation were performed. Summary:

1. Add a strong signature to the project. Procedure: Right-click the project, select Properties, find the signature tab, create a signature file, and enter the password.

2. After the project is released, the dll and exe files will be obfuscated. the obfuscation tool is Dotfuscator Professional Edition 4.2. To confuse web projects, exclude the web project file rename function. Otherwise, the aspx file cannot reference the dll assembly. Pay attention to the reference of the HttpModule class.

3. If you are not at ease, you can shell the obfuscated files. Shell tool: MaxtoCode.Professional.2007.v3.21-Lz0.rar this tool I have not personally tried, interested in their own research.

The above three layers of protection should be able to deal with general cainiao attacks. There is nothing to say in this article, but I 'd like to introduce it to you. It should be helpful for users who are not confused. Avoid detours.

I took a lot of detours. I have been searching for Dotfuscator Professional Edition 4.3 for a long time, and I have been exploring it for a long time with other obfuscation software. I have to mention a software: Xenocode Postbuild, the latest version is 2008, this software is a well-known obfuscator. However, I have not found a good download. If you have any software, please send it to me. NET Reactor (with registration files) is also a obfuscator that can be used to confuse versions earlier than. net 2.0.

Conclusion: The two methods mentioned above, "strong signature" and "Dotfuscator Professional Edition 4.2", are obfuscation methods that are easy to use to protect the assembly. Recommended.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.