Reverse Engineering RET Homepage RET Members Reverse Engineering Projects Reverse Engineering Papers Reversing Challenges Reverser Tools RET Re-Search Engine Reverse Engineering Forum Reverse Engineering Links

Go Back   Reverse Engineering Team Board > Reverse Engineering Board > .NET Reverse Engineering
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Reply
 
Thread Tools Display Modes
  #1  
Old 04-10-2013, 12:10 AM
alisa alisa is offline
Member
 
Join Date: Dec 2007
Posts: 32
Default

Hi All
are there any tutorials to unpack this protection?
i tried de4dot, it can be load in reflector but failed to display the codes..all the methods are shown as

private void method_2(object sender, EventArgs e)
{
throw new ApplicationException();
}

i also tried olly + illy but i also failed to locate the offset in CFF explorer produced by illy IL codes, so i tried it for whole day today.

Hope you guys helping me to find a tuotorial or giving some hints to unpack it.
The targets is available at
http://depositfiles.com/files/b0txbgf0u
Thanks.

Nobody have any clue...no hint?
any help or hint or tutorial is highly appreciated.

Last edited by Git : 04-10-2013 at 07:15 AM.
Reply With Quote
  #2  
Old 05-22-2013, 02:58 AM
user1 user1 is offline
Senior Member
 
Join Date: Jun 2011
Posts: 332
Post

That looks like Confuser is used.
Reply With Quote
Reply


Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump





Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2023, Jelsoft Enterprises Ltd.