. NET obfuscation Dotfuscator provides powerful tamper defense and prompt functionality to effectively detect tampering, inject fact-tampering defenses, and automate incident management and response. This article mainly describes how to use. NET code obfuscation Dotfuscator detects tampering with the application.
Dotfuscator contains a tamper detection tool that is located in the Dotfuscator folder (C:\Program files\preemptive solutions\dotfuscator Professional Edition 4.4\tampertester.exe).
The test tampering steps are as follows:
1. Right-click the Dotfuscator project and select Build to run Dotfuscator. The Output window will first display the Medicalimage builds, and then the post-build process of the Dotfuscator is displayed.
2. Copy the MDB database file to the output directory of the Dotfuscator.
3. In the output directory of Dotfuscator, run Tampertester MedicalImage.exe.
4, Tampertester will create a modified, but can use MedicalImage.exe in the tampered subfolder.
5. Copy the MDB file to the Dotfuscator output directory.
6. Run the tampered application.