473,799 Members | 2,683 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Dotfuscator and others

Guys,

What's the current situation with obfuscating, dotfuscating, encryption and
other tricks that we could do to .NET applications before deployment? It
wasn't very good a year ago, was something changed since that?

Just D.
Nov 16 '05 #1
9 1440
No real breakthroughs, no. I don't forsee anyway for obfuscation to
improve by leaps and bounds without some signifigant change in the
framework.

--
Scott
http://www.OdeToCode.com/blogs/scott/

On Fri, 15 Oct 2004 17:39:46 -0700, "Just D." <no@spam.please > wrote:
Guys,

What's the current situation with obfuscating, dotfuscating, encryption and
other tricks that we could do to .NET applications before deployment? It
wasn't very good a year ago, was something changed since that?

Just D.


Nov 16 '05 #2
I don't think there's much new yet but some cool sounding stuff is coming.
http://www.pbs.org/cringely/pulpit/pulpit20040219.html

jim

"Just D." <no@spam.please > wrote in message
news:A5_bd.3758 3$kz3.4869@fed1 read02...
Guys,

What's the current situation with obfuscating, dotfuscating, encryption
and other tricks that we could do to .NET applications before deployment?
It wasn't very good a year ago, was something changed since that?

Just D.

Nov 16 '05 #3
IMO, not worth reading. Very biased with leaps of logic.

--
William Stacey, MVP

"Jim H" <no****@jimsacc ount.com> wrote in message
news:u$******** *****@TK2MSFTNG P15.phx.gbl...
I don't think there's much new yet but some cool sounding stuff is coming.
http://www.pbs.org/cringely/pulpit/pulpit20040219.html

jim

"Just D." <no@spam.please > wrote in message
news:A5_bd.3758 3$kz3.4869@fed1 read02...
Guys,

What's the current situation with obfuscating, dotfuscating, encryption
and other tricks that we could do to .NET applications before deployment? It wasn't very good a year ago, was something changed since that?

Just D.



Nov 16 '05 #4
I have to agree. I try to stay busy innovating; I find it renders reverse
engineering pretty impractical.

--Bob

"William Stacey [MVP]" <st***********@ mvps.org> wrote in message
news:%2******** *******@TK2MSFT NGP09.phx.gbl.. .
IMO, not worth reading. Very biased with leaps of logic.

--
William Stacey, MVP

"Jim H" <no****@jimsacc ount.com> wrote in message
news:u$******** *****@TK2MSFTNG P15.phx.gbl...
I don't think there's much new yet but some cool sounding stuff is
coming.
http://www.pbs.org/cringely/pulpit/pulpit20040219.html

jim

Nov 16 '05 #5
I know it's just speculation, but I found it interesting what some are
trying to do..

Isn't making reverse engineering impractical the whole idea?

jim

"Bob Grommes" <bo*@bobgrommes .com> wrote in message
news:OT******** ******@TK2MSFTN GP15.phx.gbl...
I have to agree. I try to stay busy innovating; I find it renders reverse
engineering pretty impractical.

--Bob

"William Stacey [MVP]" <st***********@ mvps.org> wrote in message
news:%2******** *******@TK2MSFT NGP09.phx.gbl.. .
IMO, not worth reading. Very biased with leaps of logic.

--
William Stacey, MVP

"Jim H" <no****@jimsacc ount.com> wrote in message
news:u$******** *****@TK2MSFTNG P15.phx.gbl...
I don't think there's much new yet but some cool sounding stuff is
coming.
http://www.pbs.org/cringely/pulpit/pulpit20040219.html

jim


Nov 16 '05 #6
Just D. wrote:
Guys,

What's the current situation with obfuscating, dotfuscating, encryption and
other tricks that we could do to .NET applications before deployment? It
wasn't very good a year ago, was something changed since that?


Well, obfuscators do a good job, even the community edition of dotfuscator
can create unreadable code, but you have to program for it first. So here are
some tips.

1) download a copy of NDepend. http://smacchia.chez.tiscali.fr/NDepend.html
This tool shows you which methods can be internal, private and protected
while you probably made everything public for example.
2) your .exe application should solely contain internal classes and internal
methods/properties (or private).
3) seal your mainform / startup form.

Due to the internal classes and internal/private methods, the code can be
mangled very good as types can be mangled as well. If you don't do this, code
will be almost not obfuscated, at least not the types and public methods.

Frans.

--
Get LLBLGen Pro, productive O/R mapping for .NET: http://www.llblgen.com
My .NET Blog: http://weblogs.asp.net/fbouma
Microsoft C# MVP
Nov 16 '05 #7
Jim H wrote:
I know it's just speculation, but I found it interesting what some are
trying to do..

Isn't making reverse engineering impractical the whole idea?
Not necessarily. A library perhaps can't be reverse engineered, but the
interface it exposes can still be used in your own code. What's thus also a
problem is finding copy protection code. Through obfuscation, this can be a
very hard job. Which makes the protection of the obfuscated work a little
easier.

Frans.

"Bob Grommes" <bo*@bobgrommes .com> wrote in message
news:OT******** ******@TK2MSFTN GP15.phx.gbl...
I have to agree. I try to stay busy innovating; I find it renders
reverse engineering pretty impractical.

--Bob

"William Stacey [MVP]" <st***********@ mvps.org> wrote in message
news:%2******** *******@TK2MSFT NGP09.phx.gbl.. .
IMO, not worth reading. Very biased with leaps of logic.

--
William Stacey, MVP

"Jim H" <no****@jimsacc ount.com> wrote in message
news:u$******** *****@TK2MSFTNG P15.phx.gbl...
I don't think there's much new yet but some cool sounding stuff is
coming.
http://www.pbs.org/cringely/pulpit/pulpit20040219.html
>
jim



--
Get LLBLGen Pro, productive O/R mapping for .NET: http://www.llblgen.com
My .NET Blog: http://weblogs.asp.net/fbouma
Microsoft C# MVP
Nov 16 '05 #8
William Stacey [MVP] <st***********@ mvps.org> wrote:
IMO, not worth reading. Very biased with leaps of logic.


And hugely inaccurate.

Let's see:

1) "The problem is .NET, Microsoft=3Fs slowly evolving and very difficult
to understand effort to network-enable everything [...]"

That gives a completely inaccurate idea of the aim of .NET. Network-
enablement is only a small part of the story.

2) "You can write a program in C# or Visual Basic.NET. .NET is almost
exclusively Just-In-Time compiled. JIT'ing means, "I was just about to
interpret this, but I'll compile it at the very last minute instead."
In effect, the .NET code remains in interpretation-intended form right
up until the end."

Given that it's exclusively JIT-ted, claiming that it's
"interpreta tion-intended" at any point is bizarre.

3) "Java is interpreted and subject to this same vulnerability"

Apparently Robert still lives in about 1996, when Java really *was*
interpreted. While HotSpot (the most commonly used JVM, I believe) is a
mixed-mode JVM, interpreting code sometimes and JIT-ting it at other
times, the vast majority of JVM execution is JITted code, not
interpreted.

4) "The result is that nearly every emerging Microsoft product is
vulnerable, including the OS itself. That=3Fs one reason why we are
always hearing more, not fewer, stories about Microsoft security
problems."

How many security vulnerabilities have been announced in .NET products?

5) "The answer to providing a modicum of security for interpreted
applications has to this point been obfuscation -=3F making the code look
different so it can be difficult to decompile and figure out."

No, the answer to providing security is in strong authentication of
code, and making sure that that code itself is secure. Something being
easily reverse engineered doesn't make something insecure: if your
security relies on people not knowing exactly what the program does,
your code isn't secure to start with. Security through obscurity just
doesn't work.
Those aren't all the problems with the article (the idea that dynamic
program changes should basically be variable renaming ones is
ridiculous) but they're the clearest ones...

--
Jon Skeet - <sk***@pobox.co m>
http://www.pobox.com/~skeet
If replying to the group, please do not mail me too
Nov 16 '05 #9
Well, there is Syncfuscation and confuscation. Syncfuscation is for
C#.Net, I read somewhere and the latter, is something that I am toying
with myself because the name sounds swell!:)

Tell you what, all fuscations sound like somebody was frisking something
from a general store or something.

Probably, a change of suffix is called for!

with regards,
J.V.Ravichandra n
- http://www.geocities.com/
jvravichandran
- http://www.411asp.net/func/search?
qry=Ravichandra n+J.V.&cob=aspn etpro
- http://www.southasianoutlook.com
- http://www.MSDNAA.Net
- http://www.csharphelp.com
- http://www.poetry.com/Publications/
display.asp?ID= P3966388&BN=999 &PN=2
- Or, just search on "J.V.Ravichandr an"
at http://www.Google.com

*** Sent via Developersdex http://www.developersdex.com ***
Don't just participate in USENET...get rewarded for it!
Nov 16 '05 #10

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

10
3761
by: Darren | last post by:
OK, I'm trying to understand the need for this. If I understand correctly without this anyone can reverse engineer and obtain the source code of my application - is this correct? And this tool will prevent this? Why isn't this tool automatically executed by default whenever I build my apps? My company is building corporate applications and don't want our source code available to anyone. I assume there is a Dotfuscator that
0
1428
by: venky | last post by:
How can i integrate dotfuscator with my solution projects. Like when i build projects in my solution using visual studio.net, i want to be build using dotfuscator. Like i have a setup project which takes the dll from some directory. Before i run the setup project, i want the dlls to be built using dotfuscator and i don't want any manual operation. How can u integrate with build process or setup process? I am dotfuscator community...
3
3991
by: Tom Bean | last post by:
I am using Dotfuscator Community Edition to obfuscate an application for Pocket PC written in C#. When I made the first pass with Dotfuscator, the app threw a MissingManifestResourceException. Of course, since the app has been obfuscated, the only information I got about what caused the error pointed to resource aq. The Dotfuscator listing window had WARNINGs about all the forms in my app, so I excluded them on the 'Rename' tab and...
2
2304
by: Tina | last post by:
I have a dll created from an asp.net component I wrote. I want to distribute it to other developers but I'm told it can be reverse engineered. I read the docs on dotfuscator thinking that this could add protection. The docs say that to run it from vs.net to run it from the external tools menu then follow the gui. The External Tools dialog box comes up, I highlight Dot&Fuscator Community Edition, Hit OK and nothing happens. What am I...
1
1294
by: Tina | last post by:
I found the dotfuscator GUI interface. It wants me to open an xml file. My component project has no xml file. Also, is there a specific forum for dotfuscator issues? It's not mentioned in any of the security forums. thanks, T
0
877
by: venky | last post by:
When i run dotfuscator for my projects in my solution, for one dll i get an error which is as follows. Running c:\Program Files\Microsoft Visual Studio .NET 2003\SDK\v1.1\\bin\ildasm.exe /OUT=C:\Project\U2\taskobscutor\Main\temp\Dimension.framework.dll.il /TEXT /NOBAR /RAWEH /QUOTEALLNAMES /UTF8 C:\Project\U2\taskobscutor\Main\bin\release\Dimension.framework.dll Encountered 0x00000000 at line 4537, column 69.
8
7614
by: Wacom | last post by:
Hi all! I'm doing some test of obfuscation of assembly marked with the strong name (Fw 2.0). Someone can tell me how does this work? I mean: if I have an exe and a couple of dll marked w/strong name and I obfuscate the dll when I run the exe it crashes because cannot load the
1
4667
by: dongarbage | last post by:
The subject says it all :) I have Visual Studio 2005, it comes with community edition of dotfuscator. I'd like to use dotfuscator in a post-build event. However, I get an error when I call dotfuscator. I can run it from the command line and it always pops up a gui even when \q option is used. Is there a way to get dotfuscator community edition to work as a post-build event? Also, is there a way to get it to run from the command line...
4
1509
by: GaryDean | last post by:
I'm trying to use DotFuscator Community edition but the help is for Professional edition. The process appears intentionally arcane. Is there any material on how to use the Community Edition anywhere? -- Regards, Gary Blakely
1
10248
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
10032
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
9085
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
7573
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
6811
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5469
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5597
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
1
4148
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
3764
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.