SlideShare a Scribd company logo
Obfuscation in
.NET
A look at Dotfuscator
Professional
What is Obfuscation
In software development, manual obfuscation is the deliberate act of creating
obfuscated code, i.e. source or machine code that is difficult for humans to
understand. Like obfuscation in natural language, it may use needlessly
roundabout expressions to compose statements. Programmers may
deliberately obfuscate code to conceal its purpose (security through obscurity)
or its logic, in order to prevent tampering, deter reverse engineering, or as a
puzzle or recreational challenge for someone reading the source code.
In addition, tools known as obfuscators can provide automated obfuscation to
compiled applications that make reverse engineering more difficult for people
and machines but do not alter the behavior of the obfuscated application.
- Wikipedia
But these are hackers
How Companies Describe It
❖ SmartAssembly is an obfuscator that helps protect your
application against reverse-engineering or modification,
by making it difficult for a third-party to access your
source code. - RedGate
❖ By making an application much more difficult to
reverse-engineer, you can protect against trade secret
(intellectual property) theft, unauthorized access,
bypassing licensing or other controls, and vulnerability
discovery. - Preemptive Solutions
Why Do It
How Does it Work
Multiple Parts
❖ String Encryption
❖ Method Renaming - Overloading
❖ Code Injection - Control Flow
❖ Anti-Tampering Techniques
❖ Other Techniques (Linking, WaterMarking, etc.)
A Quick Tour of Dotfuscator
Our Examples
String Encryption
Beating String Encryption
Renaming Methods
Renaming Methods Issues
Control Flow
How Does This Work
CLR and C#
Anti-Debugging Techniques
Anti-Tampering Techniques
Telemetry
Conclusions

More Related Content

Viewers also liked

Calculo placa base caso 1
Calculo placa base caso 1Calculo placa base caso 1
Calculo placa base caso 1
Ing. Ruben J. Gonzalez P.
 
Club2017 itziar
Club2017 itziarClub2017 itziar
Club2017 itziar
acidh
 
Club2017 melarmina
Club2017 melarminaClub2017 melarmina
Club2017 melarmina
acidh
 
Club2017 marta
Club2017 martaClub2017 marta
Club2017 marta
acidh
 
Comprension lectora sexto
Comprension lectora sextoComprension lectora sexto
Comprension lectora sexto
Francisca Jerez Jerez
 
Club2017 francisca
Club2017 franciscaClub2017 francisca
Club2017 francisca
acidh
 
March crystal gateway calendar & newsletter 2017
March crystal gateway calendar & newsletter 2017March crystal gateway calendar & newsletter 2017
March crystal gateway calendar & newsletter 2017
Rosalie Muir
 
CULTURA,POLITICA Y CULTURA POLITICA
CULTURA,POLITICA Y CULTURA POLITICACULTURA,POLITICA Y CULTURA POLITICA
CULTURA,POLITICA Y CULTURA POLITICA
Damian Tique
 

Viewers also liked (8)

Calculo placa base caso 1
Calculo placa base caso 1Calculo placa base caso 1
Calculo placa base caso 1
 
Club2017 itziar
Club2017 itziarClub2017 itziar
Club2017 itziar
 
Club2017 melarmina
Club2017 melarminaClub2017 melarmina
Club2017 melarmina
 
Club2017 marta
Club2017 martaClub2017 marta
Club2017 marta
 
Comprension lectora sexto
Comprension lectora sextoComprension lectora sexto
Comprension lectora sexto
 
Club2017 francisca
Club2017 franciscaClub2017 francisca
Club2017 francisca
 
March crystal gateway calendar & newsletter 2017
March crystal gateway calendar & newsletter 2017March crystal gateway calendar & newsletter 2017
March crystal gateway calendar & newsletter 2017
 
CULTURA,POLITICA Y CULTURA POLITICA
CULTURA,POLITICA Y CULTURA POLITICACULTURA,POLITICA Y CULTURA POLITICA
CULTURA,POLITICA Y CULTURA POLITICA
 

Similar to Dotfuscator

Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
Gaurav Mishra
 
A taxonomy of obfuscating transformations
A taxonomy of obfuscating transformationsA taxonomy of obfuscating transformations
A taxonomy of obfuscating transformations
emanuele_nl
 
IRJET- Obfuscation: Maze of Code
IRJET- Obfuscation: Maze of CodeIRJET- Obfuscation: Maze of Code
IRJET- Obfuscation: Maze of Code
IRJET Journal
 
linkedin brainies
linkedin brainieslinkedin brainies
linkedin brainies
Vincent lefebvre
 
Code protection
Code protectionCode protection
Code protection
whitecryption
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking
- Mark - Fullbright
 
Hass and associates cyber security
Hass and associates cyber securityHass and associates cyber security
Hass and associates cyber security
brn8brwn
 
Software potential code protector
Software potential code protector Software potential code protector
Software potential code protector
InishTech
 
A Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity EducationA Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity Education
ijtsrd
 
my new HACKING
my new HACKINGmy new HACKING
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
Tapan Khilar
 
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Edureka!
 
Email hacker
Email hackerEmail hacker
Email hacker
MohammadRizwan126
 
Is Data Secure On The Password Protected Blackberry Device
Is Data Secure On The Password Protected Blackberry DeviceIs Data Secure On The Password Protected Blackberry Device
Is Data Secure On The Password Protected Blackberry Device
Yury Chemerkin
 
Phone hack
Phone hackPhone hack
Phone hack
MohammadRizwan126
 
Hacker
HackerHacker
Digital Security Risk.pptx
Digital Security Risk.pptxDigital Security Risk.pptx
Digital Security Risk.pptx
AdrianVANTOPINA
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
IJERA Editor
 
Visual hacking is used to visually capture private,sensitive informa.pdf
Visual hacking is used to visually capture private,sensitive informa.pdfVisual hacking is used to visually capture private,sensitive informa.pdf
Visual hacking is used to visually capture private,sensitive informa.pdf
anandshingavi23
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
PavelVtek3
 

Similar to Dotfuscator (20)

Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
 
A taxonomy of obfuscating transformations
A taxonomy of obfuscating transformationsA taxonomy of obfuscating transformations
A taxonomy of obfuscating transformations
 
IRJET- Obfuscation: Maze of Code
IRJET- Obfuscation: Maze of CodeIRJET- Obfuscation: Maze of Code
IRJET- Obfuscation: Maze of Code
 
linkedin brainies
linkedin brainieslinkedin brainies
linkedin brainies
 
Code protection
Code protectionCode protection
Code protection
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking
 
Hass and associates cyber security
Hass and associates cyber securityHass and associates cyber security
Hass and associates cyber security
 
Software potential code protector
Software potential code protector Software potential code protector
Software potential code protector
 
A Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity EducationA Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity Education
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
Ethical Hacking Career | Ethical Hacker Jobs & Salary | Cybersecurity Course ...
 
Email hacker
Email hackerEmail hacker
Email hacker
 
Is Data Secure On The Password Protected Blackberry Device
Is Data Secure On The Password Protected Blackberry DeviceIs Data Secure On The Password Protected Blackberry Device
Is Data Secure On The Password Protected Blackberry Device
 
Phone hack
Phone hackPhone hack
Phone hack
 
Hacker
HackerHacker
Hacker
 
Digital Security Risk.pptx
Digital Security Risk.pptxDigital Security Risk.pptx
Digital Security Risk.pptx
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
Visual hacking is used to visually capture private,sensitive informa.pdf
Visual hacking is used to visually capture private,sensitive informa.pdfVisual hacking is used to visually capture private,sensitive informa.pdf
Visual hacking is used to visually capture private,sensitive informa.pdf
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 

Recently uploaded

Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 

Recently uploaded (20)

Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 

Dotfuscator

  • 1. Obfuscation in .NET A look at Dotfuscator Professional
  • 2. What is Obfuscation In software development, manual obfuscation is the deliberate act of creating obfuscated code, i.e. source or machine code that is difficult for humans to understand. Like obfuscation in natural language, it may use needlessly roundabout expressions to compose statements. Programmers may deliberately obfuscate code to conceal its purpose (security through obscurity) or its logic, in order to prevent tampering, deter reverse engineering, or as a puzzle or recreational challenge for someone reading the source code. In addition, tools known as obfuscators can provide automated obfuscation to compiled applications that make reverse engineering more difficult for people and machines but do not alter the behavior of the obfuscated application. - Wikipedia
  • 3. But these are hackers
  • 4. How Companies Describe It ❖ SmartAssembly is an obfuscator that helps protect your application against reverse-engineering or modification, by making it difficult for a third-party to access your source code. - RedGate ❖ By making an application much more difficult to reverse-engineer, you can protect against trade secret (intellectual property) theft, unauthorized access, bypassing licensing or other controls, and vulnerability discovery. - Preemptive Solutions
  • 6. How Does it Work
  • 7. Multiple Parts ❖ String Encryption ❖ Method Renaming - Overloading ❖ Code Injection - Control Flow ❖ Anti-Tampering Techniques ❖ Other Techniques (Linking, WaterMarking, etc.)
  • 8. A Quick Tour of Dotfuscator

Editor's Notes

  1. .foreach (objStatsVariable {!dumpheap -type System.String -short}) {.printf "\n%mu",${objStatsVariable} + c }