In nature, I think everyone should be familiar with shell. We can see from the above stories. Plants in nature use it to protect seeds, and animals use it to protect the body. Similarly, some computer software also has a program dedicated to protecting the software from unauthorized modification or decompilation. They generally run programs before they get control and then complete their tasks to protect the software. Just like the shells of animals and plants are generally taken for granted outside the body (but there is also a so-called "seed shell in the shell ). Because this program has many similarities in functionality with the shell of nature, such a program is called a "shell" based on naming rules. Just like computer viruses and viruses in nature, they are actually naming methods. Functionally abstract, the shell of the software is almost the same as that of the natural world. It is nothing more than protecting and hiding things in the shell. From a technical point of view, the shell is a piece of code executed before the original program. The code of the original program may be compressed and encrypted during shelling ....... When the files after shelling are executed, shell-the code runs before the original program. It restores the compressed and encrypted code to the original program code, and then returns the execution right to the original code. The software shells are classified into encryption shells, compression shells, camouflage shells, and multi-layer shells to hide the real OEP of the Program (entry point to Prevent Cracking ). For more information about the "shell" and related software development history, see Mr. Wu's "Everything starts with" shell ".
(1) Shell Concept
Compile the software and compile it into an exe executable file.
1. Some copyright information needs to be protected without any modification, such as the author's name. To protect the software from being cracked, shells are usually used for protection.
2. You need to make the program a little easier to use. Therefore, some software is required to compress the executable files of exe,
3. In the hacker community, shells and shells Trojans and other software to avoid anti-virus software. To implement the above functions, these software are called shelling software.
(2) The most common shelling Software
ASPACK, UPX, PEcompact less frequently used shelling software WWPACK32; PE-PACK; PETITE NEOLITE
(3) software used to detect shells and software in programming languages
Because we need to check the shell type before shelling.
1.fileinfo.exe, the shell detection software, is short as fi.exe (with powerful shell detection capabilities ).
2. age.exe, a programming language used by the detection shell and software, is a good combination of the two functions. It is recommended that the ageage2000 Chinese version (specialized detection and shelling type ).
3. Commonly Used programming language of the software: Delphi, Visual Basic (VB) --- the most difficult to crack, Visual C (VC ).
[Content navigation] |
Page 1: Discuss the software shell and how to shell and shell Removal |
Page 1: Discuss the software shell and how to shell and shell Removal |
Page 1: Discuss the software shell and how to shell and shell Removal |
|