Completed
If you know the enemy and know yourself, you need not fear the results of a hundred battles.
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Hacking .NET Applications - The Black Arts
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Training Malware Analysis Code Review Application Penetration Testing Custom Security Modification Research
- 3 How-To Attack .NET Applications Tools and Methodology of Attacking Overcome "secure" .NET Applications Building KeyGen/Crack/Hacks/Malware Reverse Engineering for Protection
- 4 If you know the enemy and know yourself, you need not fear the results of a hundred battles.
- 5 Flip The Check Set Value is "True" Cut The Logic Return True Access Value
- 6 1 Fake the Call SystemID = 123456789 2. Fake the Request 3. Fake the Reply Reg Code = 13V541 4. Win *Registered True
- 7 COMPLEX MATH 1. Chop up the Math 2. Attack the Weak 3. ?????????? 4. Profit
- 8 Static Crypto Key Vector init = 0 Clear TXT Password Storage
- 9 Protection - Security Signed code (1024 bit CRYPTO) Verify the creator Strong Names ACLS......... M$ stuff Try to SHUTDOWN Tampering
- 10 Code Obfuscation Logic Obfuscation Unmanaged calls...to C/C++/ASM Shells / Packers / Encrypted code Try to SHUTDOWN Decompilation
- 11 The Data sent home is Application Info User / Registartion Info Security / System Info
- 12 The Crypto Key is A Hard Coded Key The Licence Number A MD5 Hash of the Pass