Completed
COMPLEX MATH 1. Chop up the Math 2. Attack the Weak 3. ?????????? 4. Profit
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Hacking .NET Applications - The Black Arts
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Training Malware Analysis Code Review Application Penetration Testing Custom Security Modification Research
- 3 How-To Attack .NET Applications Tools and Methodology of Attacking Overcome "secure" .NET Applications Building KeyGen/Crack/Hacks/Malware Reverse Engineering for Protection
- 4 If you know the enemy and know yourself, you need not fear the results of a hundred battles.
- 5 Flip The Check Set Value is "True" Cut The Logic Return True Access Value
- 6 1 Fake the Call SystemID = 123456789 2. Fake the Request 3. Fake the Reply Reg Code = 13V541 4. Win *Registered True
- 7 COMPLEX MATH 1. Chop up the Math 2. Attack the Weak 3. ?????????? 4. Profit
- 8 Static Crypto Key Vector init = 0 Clear TXT Password Storage
- 9 Protection - Security Signed code (1024 bit CRYPTO) Verify the creator Strong Names ACLS......... M$ stuff Try to SHUTDOWN Tampering
- 10 Code Obfuscation Logic Obfuscation Unmanaged calls...to C/C++/ASM Shells / Packers / Encrypted code Try to SHUTDOWN Decompilation
- 11 The Data sent home is Application Info User / Registartion Info Security / System Info
- 12 The Crypto Key is A Hard Coded Key The Licence Number A MD5 Hash of the Pass