Reverse Engineering RET Homepage RET Members Reverse Engineering Projects Reverse Engineering Papers Reversing Challenges Reverser Tools RET Re-Search Engine Reverse Engineering Forum Reverse Engineering Links

Go Back   Reverse Engineering Team Board > Reverse Engineering Board > .NET Reverse Engineering
FAQ Members List Calendar Search Today's Posts Mark Forums Read

Reply
 
Thread Tools Display Modes
  #1  
Old 08-25-2008, 10:23 AM
amri_amin amri_amin is offline
Junior Member
 
Join Date: Aug 2008
Posts: 2
Default Obfuscator/Packer identification

Hi,

I have a .Net assembly packed into win32 executable. I've tried many tutos to extract the .net code without success. Is there any method (footprints, tools ...) to identify the obfuscator used.
Thanks
Reply With Quote
  #2  
Old 08-25-2008, 11:10 AM
Kurapica Kurapica is offline
Senior Member
 
Join Date: May 2006
Location: Archives
Posts: 357
Default

maybe it's a better idea to post the target so that people can have a look at the file.
__________________
Life can only be understood backwards but It must be read forwards.
Reply With Quote
  #3  
Old 08-25-2008, 04:06 PM
amri_amin amri_amin is offline
Junior Member
 
Join Date: Aug 2008
Posts: 2
Default

Here is the file:

http://rapidshare.com/files/140072815/ReverseMe.exe
Reply With Quote
Reply


Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump





Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2023, Jelsoft Enterprises Ltd.