We usually achieve software protection through code obfuscation and encryption. In Web development, we may have encountered JavaScript code encryption. By obfuscation and encryption of JS code, we can protect the core JavaScript code. If you haven't touched any of them, let's take a look at them here. We won't go into detail this time.
In the past Win32 software, the shelling technology has developed very mature. There were well-known domestic forums such as watching Snow and cracking my love. I
information about the currently executed assembly or call the Assembly, as shown in:Copy codeThe Code is as follows:System. Reflection. Assembly. GetExecutingAssembly ()System. Reflection. Assembly. GetCallingAssembly ()You can use the sn.exe command line tool in. net sdkto Generate Keys and signatures, or use the project-properties-signature tool in visual studio.
If the key is password protected, a pfx file is generated, and no password is used to generate an snk file. The pfx file is larger
In vs2005, mshtml is introduced in this way.
Add using mshtml at the beginning of the Code;
There is an article on the Internet to reference shdocvw:
Shdocvw must be found in the following path: (C:/program files/Microsoft Visual Studio 8/application/preemptive solutions/dotfuscator community Edition)
There is also an article to add references:
1. Create a Windows application project in Visual C #2005 or Visual C #. net. By default, form1 is
Problems15.3 use regmon to check which registry is being accessed15.4 use process explorer to better observe PROCESSES IN THE SYSTEM15.5 use CLR spy to study the interaction between CLR, pinvoke, and COM of your program15.6 use CLR profiler to track memory allocation issues15.7 debug applications deployed with clrdump15.8 use managed stack explorer to debug suspended programs and monitoring processes15.9 check the communication between HTTP and fiddler15.10 use pingplotter freeware to identify
-CodeObfuscation and encryption (RSS)
Dotfuscator community edition, a commercial tool made in maxtocode.
Net debugging and performance-related (RSS)
Language and compiler language compiler. Net freamwork/ProgramSet/IL intermediate language/disassembly/Decompilation
Reflector encryption and decryption
Understanding the Il intermediate language, reading these languages, and researching software cracking and Software Protection
Ajax. NET tech
The dotfuscator Protection Program provided by Visual Studio can encrypt strings contained in user code. For example, in the following example, to find the Registration Algorithm of this program, after loading the Assembly with. Net reflector, it is found that the strings in the Code are all in this form:
Assembly executingAssembly = Assembly.GetExecutingAssembly();ArrayList list = new ArrayList();string str = Class64.smethod_0("ᓊᓜᓙᒷᓎᓝᒶᒱᒽ");string ful
assembly. (There are corresponding solutions in the above article)
ObfuscationObfuscation is to blur the msil intermediate code generated by compilation. The simplest obfuscation is name obfuscation, the purpose of changing the namespace name, class name, method name, field name, and so on to special or other symbols is to make people dizzy, but does not change the program execution logic.I am using dotfuscator for obfuscation.Dotfuscator obfuscation
protected to improve the difficulty of decompilation. This type of fuzzy processing does not change the logic of program execution.
There are many obfuscation tools: dotfuscator, obfuscator. net, xeoncode, maxtocode
Merger
It is also possible to sign the Assembly and perform obfuscation. If the strongly-named assembly is obfuscated, an exception will occur and the program cannot be executed normally. Correct practice:
Delayed signature-Development co
balancer based on system bottlenecks. In addition to Web request responses, the service layer in distributed systems is also common. Load Balancing products can basically be divided into two categories: software-based load balancing products and hardware-based load balancing products. To save costs, use the Server Load balancer feature of Windows server.
Code Protection
To protect intellectual property rights, the common practice is to confuse published components or encrypt code. Obfuscation
from $0.99 to $499.99.
◇ [8] Directory: applications are classified into 14 categories and 41 sub-categories. submit the applications to the corresponding directory, and you can query the categories of other similar applications.
Obfuscation code:
◇ [1] download and use dotfuscator Windows Phone edition for free
Check the capabilities list:
◇ [1] install Windows Phone Developer Tools October update; System Disk: \ Program Files \ microsoft sdks \ W
I. netCodeObfuscation
. Net code obfuscation technology: Symbol renamingstring encryption and compressionresource encryption and compressionconstant literals pruningmethod signatures overload inductionclass hierarchy linerizationcode control flow obfuscationassemblies merging and embeddingxml documentation Filter
Free. Net code obfuscation tool: Eazfuscator. net
Http://www.foss.kharkov.ua/g1/projects/eazfuscator/dotnet/Default.aspx
Skater. Net obfuscator freeware Light edition
Http
Security performance debugging security performance debug. Net Performance Tuning
. NET technology-exception and debugging (RSS)
Debugger Technology of vs2008 and sharpdevelop debugging technology
. Net topic-security-SQL Injection Attack (RSS)
Clrprofile understanding and application
. Net Performance Testing Tool
. Net topic-security-verification (RSS)
. Net topic-security and encryption (RSS)
. Net topic-CodeObfuscation and encryption (RSS)
encryption is required ..However, after processing, both versions prompt that the Il format is incorrect... although it does not affect the use, this box is displayed in each new window, so you have to pass.
Dnguard trial. v4.3.1 is good. Obfuscation and encryption are supported, that is, the generated EXE prompt has expired... Check the website, registration for a year requires 99 USD. Give up ..
We had to use the tool "dotfuscator sofeware serv
thisDLL.
Write the registration algorithm and generateDLLSupplyDOTNETAssembly call to prevent cracking. In fact, this sentence is only half correct. This can only increase the difficulty of cracking the registration machine and cannot prevent the attack. Why? Because the registration is incorrect, you still needDOTNETThe program makes a concentrated judgment, so as long as you get rid of this judgment, it achieves the same cracking effect. However, if you want to analyze the registration a
intermediate code generated by compilation. The simplest obfuscation is name obfuscation, the purpose of changing the namespace name, class name, method name, field name, and so on to special or other symbols is to make people dizzy, but does not change the program execution logic.I am using dotfuscator for obfuscation.Dotfuscator obfuscation method:1. Create a new project, as shown in:
2. Select the DLL and exe files to be confused, as shown in:
-ins.
However, it is a pity that later versions are charged.
2. ILSpy
ILspy is an excellent. net platform decompilation software. Using ILspy, you can easily decompile C # And vbprograms. The software itself is a C # program and is an open source software.
3. de4dot
De4dot is an open-source. net anti-obfuscation shelling tool written in C # Based on the GPLv3 protocol. It is a very good decompilation tool under. net. Supports Dotfuscator,. NET Rea
Forum Friends Wan, he posted in my virgin newbie "[Original]Novice Hack. NETprogram"This tool is mentioned in this tool, which I am serving as an artifact-level tool. Because of its shelling ability is indeed very strong, using it I successfully took off the Dotfuscator, Maxtocode processed procedures, as for other packers/anti-obfuscation tools such as Xenocode, Themida, etc. I have not experimented, and then I will plan to study all kinds of packer
Text: string obfuscation technique in. NET program protection and how to decrypt the obfuscated stringVisual Studio provides a dotfuscator protector that can encrypt strings contained in user code. For example, in order to find the registration algorithm for this program, after loading the assembly with. NET Reflector, the string in the code is found in this form:New ArrayList (); string str = class64.smethod_0 ("?????????"); string New Version (); BO
Today we introduce an open source. NET Obfuscation--confuserexhttp://yck1509.github.io/ConfuserEx/Due to the use of. NET obfuscation in the project, there are many online searches, such as Dotfuscator, Xeoncode, Foxit and so on.But most of the charges, of course, there are cracked version of the company requirements can not use pirated software.Find a half-day finally found Confuserex, use up also line, hurriedly take out to everyone to share under.:
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.