flat assembler
Message board for the users of flat assembler.
![]() Goto page Previous 1, 2, 3, 4, 5, 6 |
Author |
|
revolution 23 May 2009, 16:21
No, you would not put the key in plain text (who said it would be in plain sight?). That is why you have the obfuscated code, to "protect" the key. It is much easier to protect a small thing (a key) than a larger entire program with just obfuscation. Remember that often debuggers are not capable enough to debug really well protected code. E.g. the use of exceptions to execute functions can confuse almost all of the debuggers out there. It is not perfect but it makes the reversers job more difficult.
|
|||
![]() |
|
Azu 23 May 2009, 16:31
revolution wrote: No, you would not put the key in plain text (who said it would be in plain sight?). That is why you have the obfuscated code, to "protect" the key. It is much easier to protect a small thing (a key) than a larger entire program with just obfuscation. Remember that often debuggers are not capable enough to debug really well protected code. E.g. the use of exceptions to execute functions can confuse almost all of the debuggers out there. It is not perfect but it makes the reversers job more difficult. |
|||
![]() |
|
Borsuc 23 May 2009, 22:50
Who cares? You can just run the executable and dump it from memory with a debugger when it is decrypted. Problem solved. I've done this myself in "obscure" UPX modified programs. Is that even allowed? It's not allowed in the UPX license to modify it for commercial purposes.
![]() This isn't thinking big at all. People have been doing this encryption shit for years with dongles. They have been cracked (not all programs, but the principle has been cracked; as long as you can crack one of them, you can crack them all, but it doesn't mean you WILL crack them all if you don't have patience or don't want, for example). Now if you would actually compress those strings for the sake of size, then it would be beneficial. ![]() |
|||
![]() |
|
Azu 23 May 2009, 22:52
Borsuc wrote: Who cares? You can just run the executable and dump it from memory with a debugger when it is decrypted. Problem solved. I've done this myself in "obscure" UPX modified programs. Is that even allowed? It's not allowed in the UPX license to modify it for commercial purposes. |
|||
![]() |
|
Borsuc 23 May 2009, 22:53
Ever heard of run-trace in Olly?
|
|||
![]() |
|
Azu 23 May 2009, 23:23
Which is why you try to add anti-debugger code and make it as obscure as possible.
BTW I think the question was "How best to encrypt my code?" not "How do I crack someone's program?". |
|||
![]() |
|
Borsuc 24 May 2009, 00:44
Azu wrote: Which is why you try to add anti-debugger code and make it as obscure as possible. Azu wrote: BTW I think the question was "How best to encrypt my code?" not "How do I crack someone's program?". In fact if you have the decrypting routine it's always a, mathematically speaking, short process. And dongles are way more advanced than simple encryption and cracked apps go so deep that users who use warez don't even need the dongles, which means people who buy it have a lot more inconveniences... ![]() _________________ Previously known as The_Grey_Beast |
|||
![]() |
|
Azu 24 May 2009, 00:56
Good for you. In the mean time, some people want to try, and calling their efforts pointless is pointless.
|
|||
![]() |
|
revolution 24 May 2009, 01:24
Dongles suck. I have removed the offending code from all of my dongled software. They are just too troublesome and problematic. Worse is dongles that require a kernel mode driver, fuck that, I am not letting some application software access my kernel space. If you don't trust me with your program then I don't trust you with my kernel.
Now days it is becoming popular to make the program access the Internet to get a run key, this is also a stunningly bad idea. It means you can't use the program if your Internet connection is down. Plus it allows the author to track usage and introduces who knows what vulnerabilities for malware to enter. |
|||
![]() |
|
Azu 24 May 2009, 01:25
Agreed. So let's get back on topic.
|
|||
![]() |
|
Borsuc 24 May 2009, 20:02
Azu wrote: Good for you. In the mean time, some people want to try, and calling their efforts pointless is pointless. Just being honest mate. ![]() _________________ Previously known as The_Grey_Beast |
|||
![]() |
|
Azu 28 May 2009, 21:08
Borsuc wrote:
|
|||
![]() |
|
Goto page Previous 1, 2, 3, 4, 5, 6 < Last Thread | Next Thread > |
Forum Rules:
|
Copyright © 1999-2025, Tomasz Grysztar. Also on GitHub, YouTube.
Website powered by rwasa.