Hacking .NET Applications - The Black Arts

Hacking .NET Applications - The Black Arts

LASCON via YouTube Direct link

If you know the enemy and know yourself, you need not fear the results of a hundred battles.

4 of 12

4 of 12

If you know the enemy and know yourself, you need not fear the results of a hundred battles.

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Hacking .NET Applications - The Black Arts

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Training Malware Analysis Code Review Application Penetration Testing Custom Security Modification Research
  3. 3 How-To Attack .NET Applications Tools and Methodology of Attacking Overcome "secure" .NET Applications Building KeyGen/Crack/Hacks/Malware Reverse Engineering for Protection
  4. 4 If you know the enemy and know yourself, you need not fear the results of a hundred battles.
  5. 5 Flip The Check Set Value is "True" Cut The Logic Return True Access Value
  6. 6 1 Fake the Call SystemID = 123456789 2. Fake the Request 3. Fake the Reply Reg Code = 13V541 4. Win *Registered True
  7. 7 COMPLEX MATH 1. Chop up the Math 2. Attack the Weak 3. ?????????? 4. Profit
  8. 8 Static Crypto Key Vector init = 0 Clear TXT Password Storage
  9. 9 Protection - Security Signed code (1024 bit CRYPTO) Verify the creator Strong Names ACLS......... M$ stuff Try to SHUTDOWN Tampering
  10. 10 Code Obfuscation Logic Obfuscation Unmanaged calls...to C/C++/ASM Shells / Packers / Encrypted code Try to SHUTDOWN Decompilation
  11. 11 The Data sent home is Application Info User / Registartion Info Security / System Info
  12. 12 The Crypto Key is A Hard Coded Key The Licence Number A MD5 Hash of the Pass

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.