473,408 Members | 1,786 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,408 software developers and data experts.

Obfuscation: Not just for protecting intellectual property

Obfuscators aren't only used for protecting intellectual property.

See the hacker demo at this link:

http://www.preemptive.com/documentat...ackerDemo.html

For those who don't know what an obfuscator is, here's the link that
gives a brief explanation:

http://www.preemptive.com/obfuscator.html

Here are other resources concerning obfuscation:

http://www.preemptive.com/downloads/Documentation.html


*** Sent via Developersdex http://www.developersdex.com ***
Don't just participate in USENET...get rewarded for it!
Jul 21 '05 #1
4 1786
Jonathan Henderson <jh********@preemptive.com> wrote:
Obfuscators aren't only used for protecting intellectual property.

See the hacker demo at this link:

http://www.preemptive.com/documentat...ackerDemo.html


LOL - 'cos everyone ships debug versions including the PDB files.

Also interesting is the fact that he talks about user input validation,
when none is actually required, given that the customer ID is specified
as a parameter, not injected directly into the SQL statement.

Furthermore, he's suggesting making changes to the app in order to use
random bits of SQL, despite the fact that the connection string is in
the code anyway, so the more sensible thing to do would be to use that
connection string to do stuff directly to the database. Of course, with
a sensibly administered database, the user which could log in wouldn't
have access to any "dodgy" things, regardless of how they tried to do
it.

I'm not saying that obfuscation is a bad thing, but I do wish that
they'd put a bit more time into a *sensible* demo. In this case, the
connection string is the sensitive part, and so long as you could
decompile (with a suitably powerful decompiler) and then recompile the
code, it wouldn't be hard to find the places where the SqlConnection
constructor is called, insert something to write the value out
somewhere, and then recompile and run. Bingo, you're in the same boat
as you were before - all you need is a better decompiler. In fact, you
don't even really need a decompiler - just a disassembler (eg ildasm)
and enough nous to inject a single method call into the flow near the
SqlConnection constructor.

--
Jon Skeet - <sk***@pobox.com>
http://www.pobox.com/~skeet
If replying to the group, please do not mail me too
Jul 21 '05 #2
On Thu, 21 Oct 2004 12:53:32 -0700, Jonathan Henderson wrote:
Obfuscators aren't only used for protecting intellectual property.


This seems to just be an advertisement for the Preemptive obfuscator. Do
you work for them Jonathan? While I'm sure the Preemptive obfuscator is a
fine product, it is generally considered poor manners to spam the
newsgroup.

--
Chris

dunawayc[AT]sbcglobal_lunchmeat_[DOT]net

To send me an E-mail, remove the "[", "]", underscores ,lunchmeat, and
replace certain words in my E-Mail address.
Jul 21 '05 #3
<Chris Dunaway <"dunawayc[[at]_lunchmeat_sbcglobal[dot]]net">> wrote:
Obfuscators aren't only used for protecting intellectual property.


This seems to just be an advertisement for the Preemptive obfuscator. Do
you work for them Jonathan? While I'm sure the Preemptive obfuscator is a
fine product, it is generally considered poor manners to spam the
newsgroup.


Agreed. (Not that it's a particularly good advert, given the technical
problems with it that I pointed out in another post.)

Given his post earlier, Jonathan does indeed work for PreEmptive. This
was not obvious from this thread though. It's bad enough starting a new
thread just for the sake of advertising, but to do it without declaring
interests is worse.

I'll drop a line to someone in PreEmptive to express my distaste -
that's had good effects before with other companies.

--
Jon Skeet - <sk***@pobox.com>
http://www.pobox.com/~skeet
If replying to the group, please do not mail me too
Jul 21 '05 #4
Jon Skeet [C# MVP] <sk***@pobox.com> wrote:

<snip>
I'll drop a line to someone in PreEmptive to express my distaste -
that's had good effects before with other companies.


Just to follow up on this: I mailed PreEmptive about it, and had a very
fast response back. I've been convinced that it was a mistake of
inexperience rather than cynicism, if you see what I mean :)

--
Jon Skeet - <sk***@pobox.com>
http://www.pobox.com/~skeet
If replying to the group, please do not mail me too
Jul 21 '05 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
by: Charles Evans | last post by:
I'm writing an application that will log any errors to a database. If the error occured as a result of an exception being thrown, I store the stack trace as well as other information about the...
5
by: centaur | last post by:
HI All, I am now seeking tools on javascript obfuscation. I have searched for several like stunnix, . But the interface is not really neat and sounds complicated. Is there any open source...
159
by: petantik | last post by:
Are there any commercial, or otherwise obfuscators for python source code or byte code and what are their relative advantages or disadvantages. I wonder because there are some byte code protection...
5
by: Jonathan Henderson | last post by:
Obfuscators aren't only used for protecting intellectual property. See the hacker demo at this link: http://www.preemptive.com/documentation/NetHackerDemo.html For those who don't know what...
32
by: GK | last post by:
Hello, Can anybody suggest a best code obfuscation tool based on their exeperience ? (e.g.: testing effort after obfuscation is 0) thanks, GK
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.