Presentation is loading. Please wait.

Presentation is loading. Please wait.

Reverse Engineering Contemporary Countermeasures By: Joshua Schwartz.

Similar presentations


Presentation on theme: "Reverse Engineering Contemporary Countermeasures By: Joshua Schwartz."— Presentation transcript:

1 Reverse Engineering Contemporary Countermeasures By: Joshua Schwartz

2 What is RE? “Reverse Engineering is the process of extracting the knowledge or design blue-prints from anything man-made.” -Reversing, The Secrets of Reverse Engineering

3 Why RE? Legit Legacy Integration Security Research Malware Analysis Illegal Software Cracking Breaking DRM Writing Malware

4 Who’s affected? Software Developers Can your software be RE’d easily? Intellectual Property Holders Can your source code be stolen from your final product? Big money makers RE protection is important. Big money takers Corporate espionage? Maybe…

5 Software Scenario… You make some software It has trial mode and paid mode The full software and trail software is the same.exe If registered its good, if not then limit the features. You can code this right? What can the crafty Reverse Engineer do?

6 The attack Patch the.exe Somewhere is a line that jumps if equal Change this logic and now no one needs to pay for your software.

7 Types of Reversing Static Analysis Look at the executable line by line Never gets run by the CPU Like a book that you can read. Behavioral Analysis Run the program in a debugger Pause and play execution See what it does

8 Tools WinDBG OllyDbg IDA Pro Lord PE PEid

9 IDA Pro

10 OllyDbg

11 Anti Reversing Techniques Removing Symbolic Information Java keeps things like class names If it isn’t removed it can make Java very easy to reverse Obfuscation Modifies the program’s layout Doesn’t change the function Anti-debugger Code if debugger attached: crash and burn isDebuggerPresent API

12 More… Code Encryption Code is encrypted on disk A routine decrypts the code when loading into memory Packers Proprietary algorithms that rearrange/compress code Exe gets unpacked when run similar to encryption.

13 References Reversing, Secrets of Reverse Engineering – Book http://www.tuts4you.com http://pentest.cryptocity.com http://www.windowsecurity.com/articles/Reverse- Engineering-Malware-Part4.html


Download ppt "Reverse Engineering Contemporary Countermeasures By: Joshua Schwartz."

Similar presentations


Ads by Google