. Net Program obfuscation, security, protection, encryption

Source: Internet
Author: User
Tags reflector
Everyone knows that software developed by. NET is compiled into DLL or EXE files at the time of release, regardless of the webform project or winform project. However, we often want to view the software for learning or other purposes. Source code And remove some restrictions on the software. At this time, the decompilation technology will come in handy. The reflector mentioned above is such a tool.
Reflector download: http://www.svnhost.cn/Download/Detail-18.shtml

It can decompile the DLL, EXE, and other target files into the source.Code. If the target file is not obfuscated or encrypted, the source code obtained by decompilation is almost the same as the source code before software compilation. In this wayProgramCopyright, security, and other serious risks.
Another tool [B] ildasm [/B] Can decompile the target file into the Il source code. Then we can modify the Il source code, and then use [B] ilasm [/B] to compile the Il source code to obtain a modified target file, this target file removes some restrictions of the program, such as the time limit and the number of times of use.

how do we protect our programs from being modified?
compilation, decompilation, and obfuscation have been performed in the past two days. Summary:
Add a strong signature to the project. Procedure: Right-click the project, select Properties, find the signature tab, create a signature file, and enter the password.
after the project is released, the DLL and exe files will be confused. obfuscation tool: dotfuscator Professional Edition 4.2 [Download: Workshop. Otherwise, the aspx file cannot reference the DLL assembly. Pay attention to the reference of the httpmodule class.
if you are not at ease, you can shell the obfuscated files. Shell tool: MaxtoCode.Professional.2007.v3.21-Lz0.rar [Download: http://www.svnhost.cn/download/detail-334.shtml?this tool I did not have self-built, interested in research.
the above three layers of protection should be able to deal with general cainiao attacks. This article has nothing to say, but I would like to introduce it to anyone who has no contact with obfuscation. Avoid detours.
I took a lot of detours. I have been searching for dotfuscator Professional Edition 4.3 for a long time, and I have been exploring it for a long time with other obfuscation software. I have to mention a software: xenocode postbuild, the latest version is 2008, this software is a well-known obfuscator. However, I have not found a good download. If you have any software, please send it to me. There is also net Reactor (with registration file) [Download: http://www.svnhost.cn/download/detail-258.shtml.pdf is also a container, which can be earlier than 2.16.net 2.0.
conclusion: the two methods mentioned above, "strong signature" and "dotfuscator Professional Edition 4.2" [Download: http://www.svnhost.cn/download/detail-324.shtml.pdf, are easy-to-use protection solution sets. Recommended

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.