![]() |
![]() |
![]() |
![]() |
![]() |
||||||||||
|
||||||||||||||
![]() |
#1
|
|||
|
|||
![]() after unpack, use my .Net Assembly Rebuilder to rebuild the unpacked assembly.
download: http://momupload.com/files/92257/Rea...acker.rar.html
__________________
interest in .NET Reverse Engineering. Blog: http://jithook.blogspot.com/ .Net Assembly Rebuilder - a tool to rebuild dumped assemblies. Re-Max - a tool to unpack maxtocode protected assemblies. |
#2
|
|||
|
|||
![]() great job!
an advice, add log message function, so we know what's going on when the unpacker does not response. ![]() |
#3
|
|||
|
|||
![]() Wow!
![]() Bigmouse you did it again! Now I have to look for another solution ![]() Anyway, it's better to know beforehand than after, isn't it ![]() Regards, Andu |
#4
|
|||
|
|||
![]() i get an half finished solution, by jit hook.
i use reflection+invoke, then catch the msil from jit. but i can only get all methods except .ctor and .cctor. when invoke constructors and static constructors, always get exception. still don't know how to solve this poblem. hope bigmouse can help ![]() |
#5
|
|||
|
|||
![]() its library mode decrypted the whole assembly at once.
the only problem is , after decrypted, its also wiped some header values. we can use disk image to fixthe memory image . after fixed, dump memory section. seems to .net reactor itself using a diffent protection type. it only decrypt one type each time, but also can by easily unpacked. here is the unpacked file of its latest version v3.7.9.1 http://www.filesend.net/download.php...7e8d91d8892519
__________________
interest in .NET Reverse Engineering. Blog: http://jithook.blogspot.com/ .Net Assembly Rebuilder - a tool to rebuild dumped assemblies. Re-Max - a tool to unpack maxtocode protected assemblies. |
#6
|
|||
|
|||
![]() Quote:
and also .cctor will be invoked impliedly
__________________
interest in .NET Reverse Engineering. Blog: http://jithook.blogspot.com/ .Net Assembly Rebuilder - a tool to rebuild dumped assemblies. Re-Max - a tool to unpack maxtocode protected assemblies. |
#7
|
|||
|
|||
![]() Hey bigmouse,
maybe you want to give the developer of .Net Reactor some tips how he can harden his protection. I'm almost confident that he's aware of this discussion ![]() Regards, Andu |
#8
|
|||
|
|||
![]() to be a obfuscator , its not so bad.
to be a protector , its a big joke.
__________________
interest in .NET Reverse Engineering. Blog: http://jithook.blogspot.com/ .Net Assembly Rebuilder - a tool to rebuild dumped assemblies. Re-Max - a tool to unpack maxtocode protected assemblies. |
#9
|
|||
|
|||
![]() On a scale from 1 to 10 (strongest), how good do you think is the remaining protection strength of an unpacked, but still obfuscated assembly
A) for not getting the original program code back B) for protection against cracking the program (if strongly signed) ? |
#10
|
|||
|
|||
![]() Quote:
![]() @:bigmouse thanks for the tip about CreateInstance ![]() |