Overview
Syllabus
Intro
Training Malware Analysis Code Review Application Penetration Testing Custom Security Modification Research
How-To Attack .NET Applications Tools and Methodology of Attacking Overcome "secure" .NET Applications Building KeyGen/Crack/Hacks/Malware Reverse Engineering for Protection
If you know the enemy and know yourself, you need not fear the results of a hundred battles.
Flip The Check Set Value is "True" Cut The Logic Return True Access Value
1 Fake the Call SystemID = 123456789 2. Fake the Request 3. Fake the Reply Reg Code = 13V541 4. Win *Registered True
COMPLEX MATH 1. Chop up the Math 2. Attack the Weak 3. ?????????? 4. Profit
Static Crypto Key Vector init = 0 Clear TXT Password Storage
Protection - Security Signed code (1024 bit CRYPTO) Verify the creator Strong Names ACLS......... M$ stuff Try to SHUTDOWN Tampering
Code Obfuscation Logic Obfuscation Unmanaged calls...to C/C++/ASM Shells / Packers / Encrypted code Try to SHUTDOWN Decompilation
The Data sent home is Application Info User / Registartion Info Security / System Info
The Crypto Key is A Hard Coded Key The Licence Number A MD5 Hash of the Pass
Taught by
LASCON