programmers resources
  http://www.intel-assembler.it/  (c)2017 intel-assembler.it   info@intel-assembler.it
 
Search :  
Lingua Italiana    English Language   
Index
 
just an empty assembly space
just an arrow Intel Platform
just an arrow Article & Guides
just an arrow Download Software


23/01/2009 Featured Article: How to remove Buzus Virus (permalink)




:::3061933:::
Bottone Scambio Directory Pubblicitaonline.it
Home Page | Articles & Guides | Download | Intel Platform | Contacts

Google
 


Bookmark and Share
Download 
Tell a friend



Reverse engineering: Anti-cracking Techniques

How to protect your code in 24 pages

(by n.george, g.charalambous)

Reverse engineering: Anti-cracking Techniques
12/04/2008
N.George, G.Charalambous

This article is online from 2917 days and has been seen 11339 times


(*** download for full text***)

Reverse Engineering: Anti-Cracking Techniques

Table of Contents
... 3 Introduction
... 3 TODO
... 3 Reverse Engineering Tools
... 4 Reverse Engineering Approaches
... 4 Example Software
... 4 Program Analysis
... 5 Approach No1 (String References)
... 7 Suggestions (Approach No1)
... 8 Approach No2 (Breakpoint on windows API)
... 9 Suggestions (Approach No2)
... 10 Approach No3 (Stack Tracing)
... 12 Suggestions (Approach No3)
... 13 Binary Code Patching
... 20 Approach No1 (Branch Patching)
... 21 Approach No2 (Replace functions)
... 22 Serial Generating
... 22 Code Reconstructing
... 23 Code Ripping
... 24 Other

Introduction
This paper is a guide into better understanding most of the approaches a reverse engineer can follow in order to achieve his goal. Additionally, it includes a number of advices on how to better protect your software against tracing its sensitive information, like serial key checks and authentication procedures. This paper is not about changing anyone’s ideals; this paper is about people that believe that reverse engineering can create a safer world. So if you are not one of those individuals then stop reading, for this is not for you.
Note that this paper might not cover the wide range of techniques used by reverse engineers so if you feel that something is missing, please do not hesitate to email with your suggestions.

Any other suggestions are welcome. If you feel that you have something to contribute and/or offer, do not hesitate to email.
-
Reverse Engineering Tools
A number of reverse engineering tools are available over the net, a number of them are free and others need purchasing. Some of the most advanced disassembling and debugging tools out there are:
-
OllyDBG [http://www.ollydbg.de/] (Version 2 expected soon)
-
IDA Pro Disassembler and Debugger [http://www.hex-rays.com/]
-
W32Dasm [http://www.google.com] (Old, but you will be amazed with some of its functions)
-
SoftICE (Stopped being supported from April 2006)
-
WinDbg [http://www.microsoft.com/whdc/devtools/debugging/default.mspx]
Additionally, a number of other tools can be used as well. The names of the tools and their description are listed below:
-
PROTECTiON iD [http://pid.gamecopyworld.com/]
Used for scanning windows system executables for known packer/encryprtor signatures and identifying the compiler of the program [http://en.wikipedia.org/wiki/Executable_compression]
-
Import REConstructor [http://www.google.com/]
Used for repairing damaged import table (IAT) of executables
-
System Internals [http://technet.microsoft.com/en-us/sysinternals/default.aspx]
Programs like FileMon, RegMon can be used to monitor the program’s behavior. An alternative approach to this is a sandbox that provides information for all program activities.

-- source: http://www.astalavista.com

(*** download for full text***)


Top
Download 
Tell a friend
Bookmark and Share



Similar Articles

Anti Debugging Tricks Analysis
Notes by M.Forrest on 'Anti Debugging Tricks'
(by Michael Forrest)

Anti Debugging Tricks Rel.2
Tecniche di Antidebug in assembler
(by Inbar Raz)

Anti Debugging Tricks Rel.5
Antidebugging techniques
(by Inbar Raz)

Anti-Debugger Techniques
Assembler techniques for protecting code
(by Anonymous)

Applied Binary Code Obfuscation
Obfuscation in assembler
(by N.George, G.Charalambous)

Binary Protection Schemes
Code Protection under Linux
(by Andrew Griffiths)

Code Concealment
Come sigillare il proprio codice
(by Demogorgon)

Keep Your Code Hidden From Prying Eyes
Tecniche di back-jump nel codice
(by Demogorgon)

Windows Anti-Debug Reference
Several anti-debugging techniques used on Windows
(by Nicolas Falliere)

Writing Self-Modifying Code
Utilizing Advanced Assembly techniques
(by Russell Sanford)

 Tags: antidebug


webmaster jes
writers rguru, tech-g, aiguru, drAx

site optimized for IE/Firefox/Chrome with 1024x768 resolution

Valid HTML 4.01 Transitional


ALL TRADEMARKS ® ARE PROPERTY OF LEGITTIMATE OWNERS.
© ALL RIGHTS RESERVED.

hosting&web - www.accademia3.it

grossocactus
find rguru on
http://www.twitter.com/sicurezza3/
... send an email ...
Your name

Destination email

Message

captcha! Code