如何保护exe工具像反射器,没有任何obfusctar工具 [英] how to protect exe from tool like reflector without any obfusctar tool

查看:61
本文介绍了如何保护exe工具像反射器,没有任何obfusctar工具的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我正在研究一个大型ERP。在最后阶段,我得到任何人都可以通过反射器等工具看到我的代码。所以我非常害怕我的应用程序或代码

解决方案

你不能。



即使有一个混淆器(或几个)用于使代码更难阅读,你总能得到类似的东西使用反射器的输入源(无评论和正确名称) - 这就是野兽的本性。所有混淆都会使得生成的代码更难以阅读并且更难以使用 - 它无法使其无法读取或无法执行!



对不起,但这就是生活!所有代码都可以读取,.NET或本机,并且可以由其他人处理。我们所能做的就是让代码变得难以理解,使用模糊处理。


这里有很多免费和付费的obfuscaters,我喜欢的是(这是免费和开源): http://confuser.codeplex.com/ [ ^ ]


有免费的混淆器,包括Visual Studio附带的Dotfuscator Community Edition,并且打开 - 源混淆器。请参阅:[ ^ ]。



有关混淆器(包括商业混淆器)的广泛讨论,请参阅:[ http:/ /stackoverflow.com/q/2525/133321 [ ^ ]。



Visual Studio库中的混淆器:[ ^ ]。



当然,CodeProject有你应该检查的资源:[ ^ ]。



所有混淆器都是易受黑客攻击的动机,技能,和软件工具; imho,你能想到的最好的就是阻止随意拆卸。



Richard Grimes有一个关于.NET软件安全性的免费研讨会在这里:[ ^ ]。



我很好奇:你们正在签署你的集会吗?


i m working on a big ERP .At final stage i got that any one can see my code by tool like reflector.So i m very scared about my app or code

解决方案

You can't.

Even with an obfuscator (or several) used to make the code harder to read, you will always be able to get something resembling the input source (sans comments, and "proper" names) using reflector - that is the "nature of the beast". All obfuscation does is make the resulting code harder to read and much harder to work with - it can't make it "unreadable" or it couldn't execute!

Sorry, but that's life! All code can be read, .NET or native, and can be worked on by others. All we can do is make it harder for that code to be understandable using obfuscation.


There are a lot of obfuscaters out there for this both free and paid, one I like is (which is free and open sourced): http://confuser.codeplex.com/[^]


There are free obfuscators, including Dotfuscator Community Edition that comes with Visual Studio, and open-source obfuscators. See: [^].

For a broad discussion of obfuscators including commerical ones see: [http://stackoverflow.com/q/2525/133321[^].

Obfuscators on Visual Studio Gallery: [^].

Of course, CodeProject has resources you should examine:[^].

All obfuscators are vulnerable to the efforts of hackers with motivation, skills, and software tools; imho, the best you can hope with any of them is to deter casual dis-assembly.

Richard Grimes has a free "workshop" on general .NET software security on-line here: [^].

I'm curious: are you signing your assemblies ?


这篇关于如何保护exe工具像反射器,没有任何obfusctar工具的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆