Talking about "Shell" (i.)

Source: Internet
Author: User


Shell, that is, the hard skin, when the thickness of the shell and its surface rate radius of less than 0.5, known as the "thin shell", the reverse is called "thick shell." Chest armor evolved from shells, shields.

In a world of computers that is creative and absorbs nutrients from cultural technology. You can find lots of interesting things to do with reality.
For example, the Payload intent of a vulnerability attack is the payload in missile terminology. While malicious programs replicate their behavior in normal programs called infections , malicious programs that have this behavior are also analogous to biology called viruses .

As professionals deepen the operational mechanism of executable files, the cracking behavior is becoming more and more rampant. The related laws and regulations are not perfect and the enforcement is not strong. Protecting your business secrets becomes a task that programmers have to consider. And the virus is parasitic in the target program, before the target program to run the behavior, It is also used by smart programmers to protect their software assets. They encrypt the program itself before the program runs. After the parasite has run, the parasite begins to decrypt its own infected program and place them in a reasonable position. at this point the protection and anti-protection of the curtain was slowly opened.

Note: Some of the techniques that malicious programs protect against themselves are used in shells. such as:

Trace Debug, anti-ANTIASM, data encryption, code obfuscation, opcode blending, checksum, compression-based covert code, anti-tracking, offensive inversion, etc.
-< Computer virus Prevention Art >-peterszor

Computer shell Protection Program, generally divided into:

    • compression Shell : The famous representative is UPX. The main purpose is to reduce the volume of the program. There is little use of cracking countermeasures.
    • Shell : Most shells belong to this range, using one or a number of countermeasures, often including some environmental detection and anti-debugging.
    • Virtual Chassis : A virtual machine-like mechanism that transforms the original program into a confidential OPCodeby simulating the CPU, registers, stacks, explaining and executing the disassembled program.

The representative of the virtual chassis is the two products of the same company:Themida and vmprotect. The latter adds more anti-debugging capabilities based on the virtual machine mechanism and can be protected against specific code snippets. To achieve both efficiency and safety.

The Ancients have a cloud: do not accumulate silicon step, can not be thousands of miles. Our shell tour begins with a discussion of "shell program Requirements" and then explains some key points of knowledge from a case-building example. finally , gallop our imagination and create a lightweight program protection shell that belongs to you.

Are you ready?

Copyright NOTICE: This article is a blogger original article, in the case of the author and the source of the circumstances can be freely reproduced.

Talking about "Shell" (i.)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.