Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Hacking .NET Applications - The Black Arts

LASCON via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the dark arts of hacking .NET applications in this comprehensive conference talk from LASCON 2012. Delve into malware analysis, code review, and application penetration testing techniques. Learn how to overcome "secure" .NET applications, build keygens, cracks, hacks, and malware, and conduct reverse engineering for protection. Discover tools and methodologies for attacking .NET applications, including methods to flip checks, set values, cut logic, and fake system calls. Examine complex math attacks, static crypto key vulnerabilities, and various protection mechanisms such as code signing, strong names, and ACLs. Explore code obfuscation techniques, unmanaged calls, and methods to counter decompilation attempts. Gain insights into data collection, cryptographic key storage, and license number generation using MD5 hashing.

Syllabus

Intro
Training Malware Analysis Code Review Application Penetration Testing Custom Security Modification Research
How-To Attack .NET Applications Tools and Methodology of Attacking Overcome "secure" .NET Applications Building KeyGen/Crack/Hacks/Malware Reverse Engineering for Protection
If you know the enemy and know yourself, you need not fear the results of a hundred battles.
Flip The Check Set Value is "True" Cut The Logic Return True Access Value
1 Fake the Call SystemID = 123456789 2. Fake the Request 3. Fake the Reply Reg Code = 13V541 4. Win *Registered True
COMPLEX MATH 1. Chop up the Math 2. Attack the Weak 3. ?????????? 4. Profit
Static Crypto Key Vector init = 0 Clear TXT Password Storage
Protection - Security Signed code (1024 bit CRYPTO) Verify the creator Strong Names ACLS......... M$ stuff Try to SHUTDOWN Tampering
Code Obfuscation Logic Obfuscation Unmanaged calls...to C/C++/ASM Shells / Packers / Encrypted code Try to SHUTDOWN Decompilation
The Data sent home is Application Info User / Registartion Info Security / System Info
The Crypto Key is A Hard Coded Key The Licence Number A MD5 Hash of the Pass

Taught by

LASCON

Reviews

Start your review of Hacking .NET Applications - The Black Arts

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.