In association with heise online

31 October 2012, 10:04

Worth Reading: Reverse Engineering .NET bytecode

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

Worth Reading icon .NET framework programs are, like Java programs, translated into a common intermediate language – bytecode – which is used by the common language runtime. It's the .NET runtime which is then responsible for translating that bytecode into machine code for execution. A small series of articles is now available which presents the tools and techniques necessary for the analysis of that .NET byte code.

In the first part of Demystifying Dot NET Reverse Engineering, titled Big Introduction, the author, Soufiane Tahiri, analyses "Crack Me", a simple .NET app, and extracts the password it contains. In the second part, Introducing Byte Patching, he goes a step further and shows how to manipulate the byte code with a simple intervention that makes it accept any password.

(djwm)

Print Version | Send by email | Permalink: http://h-online.com/-1740624
 


  • July's Community Calendar





The H Open

The H Security

The H Developer

The H Internet Toolkit