473,472 Members | 2,184 Online
Bytes | Software Development & Data Engineering Community
Create Post

Home Posts Topics Members FAQ

Decompile .NET

Hi all
I am wondering how to protect .NET applications from being decompiled or in
other word prevent it from reverse engineering
I hope of any one can help
Thx all
Jul 6 '06 #1
23 3846
There are products that will do this for you... do a search on
"obfuscator", you should find a bunch of options like these:

http://www.xenocode.com/
http://www.dotfuscator.com/
http://www.remotesoft.com/
etc...

My understanding is that these products don't provide absolute
protection from reverse engineering (i.e. it's still possible to crack
with some effort).

John

Just close your eyes and see wrote:
Hi all
I am wondering how to protect .NET applications from being decompiled or in
other word prevent it from reverse engineering
I hope of any one can help
Thx all
Jul 6 '06 #2
Thx
but I already know this technique , and I don't want to move my problem to
other parity to sole it for me, I want to make my own technique in preventing
..NET Code from being decompiled, and if obfuscatation is the the only way to
make this protection I want to make my protection

thx again for your interest
Jul 6 '06 #3
Just close your eyes and see wrote:
but I already know this technique , and I don't want to move my problem to
other parity to sole it for me, I want to make my own technique in preventing
.NET Code from being decompiled, and if obfuscatation is the the only way to
make this protection I want to make my protection
Forgive me for being blunt, but that sounds like a really bad idea to
me. To do obfuscation well is pretty difficult, and professional tools
are likely to do a better job and be more reliable than rolling your
own version.

Of course, if you're looking into getting into the obfuscator market,
that's a different matter.

Jon

Jul 6 '06 #4
Thx Jon
I agree with u that its Difficult to make my own protection technique but
that is better than give others to obfuscate and my application and in the
same time can decompile what they have done
I think u got my point
thx again for your response

Jul 6 '06 #5
What is that stuff that you are trying to protect so vigorously?
Are you working on military or invent new video/audo processing algorigthms?

Is it really so importat to be protected?

Take into account that realeased games (written in unmanaged code) are
craked in the day of release.
It's impossible to get absolute protection.

Obfuscators gave u reasonable level of protection for those who are not
familiar with cracking, nothing else.

PS: Jon exposed his point of view on this matter in his article
http://www.yoda.arachsys.com/csharp/obfuscation.html I completly argee with
him
Thx Jon
I agree with u that its Difficult to make my own protection technique but
that is better than give others to obfuscate and my application and in the
same time can decompile what they have done
I think u got my point
thx again for your response
--
WBR,
Michael Nemtsev :: blog: http://spaces.msn.com/laflour

"At times one remains faithful to a cause only because its opponents do not
cease to be insipid." (c) Friedrich Nietzsche

Jul 6 '06 #6
You are right , and I am not making something to valuable and secure, I just
want to learn how to make my own protection and help others that want to make
protection that is all
and I know that prevent software from reverse engineering is impossible
but just want to make it difficult to be decompiled

thx for your interest
Jul 6 '06 #7
Just close your eyes and see wrote:
You are right , and I am not making something to valuable and secure, I just
want to learn how to make my own protection and help others that want to make
protection that is all
You say that you want to help others - but you've effectively rejected
the help that existing products provide. Why would anyone be more
willing to trust your obfuscator than you are to trust existing ones?

Jon

Jul 6 '06 #8
Just close your eyes and see wrote:
I agree with u that its Difficult to make my own protection technique but
that is better than give others to obfuscate and my application and in the
same time can decompile what they have done
What makes you think they would be able to decompile the code
afterwards (to anything useful)? Any obfuscator that provides a "back
door" is likely to quickly fall out of favour with the market.

Jon

Jul 6 '06 #9
I didn't say that I want to make my obfuscator , I just want to make a
technique for protecting code from being decompiled , and I don't want make a
software for that I want to make a research in this topic , and provide
others with the methods that they can customize to protect their code as
possible as we can do
that's all
and another point about Commercial obfuscators, if there is an obfuscator
there is a big probability to find a DeObfuscator

thx all
Jul 6 '06 #10
Just close your eyes and see wrote:
I didn't say that I want to make my obfuscator , I just want to make a
technique for protecting code from being decompiled , and I don't want make a
software for that I want to make a research in this topic , and provide
others with the methods that they can customize to protect their code as
possible as we can do
So you don't plan on actually building the software to do this?
and another point about Commercial obfuscators, if there is an obfuscator
there is a big probability to find a DeObfuscator
Well, obfuscation typically involves losing information. A
"deobfuscator" is as unrealistic as something which can take a hashcode
and build you the original object. A tool may try to undo a *few* of
the techniques of obfuscation, but the basic technique of making as
many names as possible unhelpful is a fundamentally lossy one.

Jon

Jul 6 '06 #11
Hey man, wake up! Your comments are absolutely irrelevant and inconsistent
all the time.

Do you have any idea what the obfuscators are doing? Even the simplest ones
are messing up the variable and method names. This is irreversible, so
without having some kind of time machine, no one can build a DeObfuscator
even against the simplest obfuscator which just changes names.
"Just close your eyes and see"
<Ju*********************@discussions.microsoft.com wrote in message
news:03**********************************@microsof t.com...
>I didn't say that I want to make my obfuscator , I just want to make a
technique for protecting code from being decompiled , and I don't want
make a
software for that I want to make a research in this topic , and provide
others with the methods that they can customize to protect their code as
possible as we can do
that's all
and another point about Commercial obfuscators, if there is an obfuscator
there is a big probability to find a DeObfuscator

thx all

Jul 6 '06 #12
May I am sleeping , but I already know that obfuscation can change the names
of the variables and routines that is not new for me :)
but the case i had stated here and u didnt got it is that the one who makes
the obfuscation pattern can DeObfuscate what he did
May i am not aware enough of the topic but this is my understnding :)
if u know the right cocept just learn us if u please:)

Thx
Jul 6 '06 #13
"Just close your eyes and see"
<Ju*********************@discussions.microsoft.com wrote in message
news:A7**********************************@microsof t.com...
May I am sleeping , but I already know that obfuscation can change the
names
of the variables and routines that is not new for me :)
but the case i had stated here and u didnt got it is that the one who
makes
the obfuscation pattern can DeObfuscate what he did
Really? So lets you look at my obfuscated code and see:

class Class1
{
public void method1()
{
...
}
}
You are able to tell me what Class1 and method1 were originally named?

--
Adam Clauss

Jul 6 '06 #14
No, he can't, but the one who wrote the obfuscator can! :-)))

"Just close your eyes and see" wrote:
>the one who makes the obfuscation pattern can DeObfuscate what he did
and is also familiar with the concept of changing names. He certainly has
some kind of time machine.

"Adam Clauss" <ca*****@tamu.eduwrote in message
news:12*************@corp.supernews.com...
"Just close your eyes and see"
<Ju*********************@discussions.microsoft.com wrote in message
news:A7**********************************@microsof t.com...
>May I am sleeping , but I already know that obfuscation can change the
names
of the variables and routines that is not new for me :)
but the case i had stated here and u didnt got it is that the one who
makes
the obfuscation pattern can DeObfuscate what he did

Really? So lets you look at my obfuscated code and see:

class Class1
{
public void method1()
{
...
}
}
You are able to tell me what Class1 and method1 were originally named?

--
Adam Clauss

Jul 6 '06 #15
i think u dont understand, you are the one who made the obfusication , so u r
the one should able DeOfusicate :)
i think u need the other comments carefully , u dont understand what we r
talking about
sorry!
Jul 6 '06 #16
Just tell me, are you more than 13 years old?

"Just close your eyes and see"
<Ju*********************@discussions.microsoft.com wrote in message
news:1A**********************************@microsof t.com...
>i think u dont understand, you are the one who made the obfusication , so u
r
the one should able DeOfusicate :)
i think u need the other comments carefully , u dont understand what we r
talking about
sorry!

Jul 6 '06 #17
Just close your eyes and see wrote:
i think u dont understand, you are the one who made the obfusication , so u r
the one should able DeOfusicate :)
i think u need the other comments carefully , u dont understand what we r
talking about sorry!
At least three people have now told you that you can't "deobfuscate".
It's worth paying attention rather than assuming they are wrong. (It's
possible they are all wrong, but unlikely in my experience.)

Obfuscation is inherently a one-way process. While the person who
actually runs the tool over the code may end up of a map from the
original name to the obfuscated name, the information is only present
in that map - so unless that map falls into the wrong hands, it is
impossible to go from the obfuscated version to the non-obfuscated
version.

So, unless you're suggesting that obfuscation technology companies have
secret "call home" backdoors whereby whenever you obfuscate some code
with their products, it gives them the map, they can't "deobfuscate"
your code.

Jon

Jul 6 '06 #18
Just close your eyes and see wrote:
i think u dont understand, you are the one who made the obfusication , so u r
the one should able DeOfusicate :)
i think u need the other comments carefully , u dont understand what we r
talking about
sorry!
I think the point he tries to demonstrate is that obfuscation doesn't
have to be two way street. There's nothing that says the obfuscation
process must be able to deterministically reverse the process.

--
Willem van Rumpt
Jul 6 '06 #19
Yes, I do understand, I'm afraid you do not understand. The error is in
your assumption that because I obfuscated it, that I can un-obfuscate it.
That is wrong. I could take two completely different sets of code and come
up with the code I showed you. It is IMPOSSIBLE to reverse the procedure.

--
Adam Clauss

"Just close your eyes and see"
<Ju*********************@discussions.microsoft.com wrote in message
news:1A**********************************@microsof t.com...
>i think u dont understand, you are the one who made the obfusication , so u
r
the one should able DeOfusicate :)
i think u need the other comments carefully , u dont understand what we r
talking about
sorry!

Jul 6 '06 #20
but the case i had stated here and u didnt got it is that the one who
makes
the obfuscation pattern can DeObfuscate what he did
What is your basis for this assumption?

--
Adam Clauss
Jul 6 '06 #21
"Real knowledge is to know the extent of one's ignorance." -Confucius
--
Co-founder, Eggheadcafe.com developer portal:
http://www.eggheadcafe.com
UnBlog:
http://petesbloggerama.blogspot.com


"Just close your eyes and see" wrote:
i think u dont understand, you are the one who made the obfusication , so u r
the one should able DeOfusicate :)
i think u need the other comments carefully , u dont understand what we r
talking about
sorry!
Jul 6 '06 #22
Just close your eyes and see wrote:
i think u dont understand, you are the one who made the obfusication , so
u r the one should able DeOfusicate :)
i think u need the other comments carefully , u dont understand what we r
talking about
sorry!
Hi Just close your eyes and see,

Unfortunately, you're slightly mistaken. From what I know, Obfuscators
apply a random algorithm to choosing the obfuscated names to the methods.

If this is the case, then you'd need to implement some sort of
Monkey-Typewriter system, where Monkeys type out the variable names for
infinity years, on typewriters by hitting random keys, in order to get back
your method names.

--
Hope this helps,
Tom Spink
Jul 6 '06 #23
I think you'd see better with your eyes open, dude. Possibly spell better,
too.

--
HTH,

Kevin Spencer
Microsoft MVP
Professional Chicken Salad Alchemist

Big thicks are made up of lots of little thins.
"Just close your eyes and see"
<Ju*********************@discussions.microsoft.com wrote in message
news:1A**********************************@microsof t.com...
>i think u dont understand, you are the one who made the obfusication , so u
r
the one should able DeOfusicate :)
i think u need the other comments carefully , u dont understand what we r
talking about
sorry!

Jul 6 '06 #24

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

6
by: Henry Bloom | last post by:
Hello, I have two questions: 1. The file-size of my mdb-Database grew extremely large after having written a lot of VBA-code. I know about the /decompile-option tried it .... it did not work....
28
by: deko | last post by:
After doing a lot of vba work, I've noticed the size of my mdb has grown, even though no data or objects have been added. I've read that the following procedure will remedy this and improve...
30
by: DFS | last post by:
I hadn't ever used it until a couple months ago, but it seems to be a handy little switch. On some .mdbs it doesn't change the size, or actually increases it a little. But on others it cut the...
13
by: Jan | last post by:
Hi: I've used the /decompile switch lots of times when working with troublesome databases. Now, though, I have a database that is secured, and I can't get the /decompile switch to work with the...
17
by: rdemyan via AccessMonster.com | last post by:
I have a launcher program that creates the shortcut to open my application using the Shell command. On the form I have a decompile checkbox that I can conveniently use to decompile my program. I...
2
by: Steve | last post by:
How do you decompile an AccessXP database? Can it be done from some external point without actually opening the database? Thank you! Steve
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
1
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
1
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...
0
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and...
0
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The...
0
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
0
muto222
php
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.