Forum: .NET Reverse Engineering
12-09-2009, 08:07 PM
|
Replies: 12
Views: 17,052
|
Forum: .NET Reverse Engineering
12-09-2009, 11:22 AM
|
Replies: 12
Views: 17,052
I tried sn already it reports: target.exe does...
I tried sn already it reports: target.exe does not represent a strongly named assembly
ILDasm doesn't work on the original exe, it reports Protected module -- cannot disassemble.
Maybe I can set a...
|
Forum: .NET Reverse Engineering
12-09-2009, 10:29 AM
|
Replies: 12
Views: 17,052
OK, I read the code again and the Public Key...
OK, I read the code again and the Public Key Token can be null (which it is). I also checked GetManifestResourceStream(executingAssembly.ManifestModule.ModuleVersionId.ToString('B')) and the result...
|
Forum: .NET Reverse Engineering
12-09-2009, 07:44 AM
|
Replies: 12
Views: 17,052
|
Forum: .NET Reverse Engineering
12-09-2009, 05:45 AM
|
Replies: 12
Views: 17,052
|
Forum: .NET Reverse Engineering
12-09-2009, 05:24 AM
|
Replies: 12
Views: 17,052
I think the problem lies here:
unit ...
I think the problem lies here:
unit Namespace_01;
interface
type
strict private Class_01 = class sealed
// Methods
function Class_01.Method_00(num1: Integer): string;
var
buffer:...
|
Forum: .NET Reverse Engineering
12-08-2009, 03:54 PM
|
Replies: 12
Views: 17,052
I put the file on rapidshare...
I put the file on rapidshare (http://rapidshare.com/files/318140919/qwerty.rar.html) and SendSpace (http://www.sendspace.com/file/okwg5o) (pwd in pm), thanks!
|
Forum: .NET Reverse Engineering
12-08-2009, 11:20 AM
|
Replies: 12
Views: 17,052
advise on .net executable
I have some experience in win32/native RCE but .net is completely new to me. I have a target .net executable that is obfuscated with Smart Assembly. I have tried DeSmart (1.0.0.9) and it appears to...
|