Dotfuscator 如何工作?

发布于 2024-08-02 21:59:48 字数 109 浏览 2 评论 0原文

Dotfuscator 如何工作?我尝试混淆我的一些类,并将方法/类重命名为 a、b、c 等。但我仍然可以看到这些方法中的代码?难道是我做错了什么?

有什么可以阻止完全阻止拆卸我的组件吗?

How does Dotfuscator work? I tried obfuscate some of my classes and it renamed the methods/class to a, b, c etc. But I can still see the code inside those methods? Is it that, I am doing something wrong?

Is there anything that would prevent a totally block deassembling my assembly?

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。

评论(7

沫离伤花 2024-08-09 21:59:48

代码混淆远远超出了类、成员和变量的简单重命名,尽管这是其中的重要组成部分。

例如,Dotfuscator 使用一种名为“重载感应”的专利技术,其中许多方法被重命名为“相同的名称”(只要它们具有不同的签名,这是可能的)。 PreEmptive 解决方案引用了代码中三分之一的方法被重命名为 a() 的情况。其他技术包括将简单迭代重写为递归,以及代码变形

事实上,现代混淆技术完全足以使代码几乎不可能被逆向工程,至少是手工逆向工程。虽然 .NET 程序集原则上永远不可能是 RE 安全的,但混淆可以提供相当强大的障碍。

对于我们大多数人来说,这就足够了。

Code obfuscation goes well beyond simple renaming of classes, members and variables, though that's an important part of it.

For example, Dotfuscator uses a patented technique called overload induction, where many methods are renamed to the same name (this is possible as long as they have different signatures). PreEmptive solutions cite cases where a third of all methods in the code are renamed to a(). Other techniques involve rewriting simple iterations as recursion, as well as code morphing.

Actually, modern obfuscation techniques are perfectly adequate for making code virtually impossible to reverse-engineer, at least by hand. While it is true that .NET assemblies can never be RE-safe in principle, obfuscation can provide a pretty formidable barrier.

For most of us, that's enough.

情话已封尘 2024-08-09 21:59:48

这就是它应该工作的方式。您的代码仍然可以访问,只是更难理解。如果您想要“更强”的东西,请查看 Xenocode PostBuild

That is the way it is supposed to work. Your code is still accessible, just more difficult to understand. If you want something "stronger", take a look at Xenocode PostBuild.

何其悲哀 2024-08-09 21:59:48

你无法阻止 .net 中的反汇编


you can't block a de-assembling in .net


内心激荡 2024-08-09 21:59:48

不幸的是,没有办法阻止有人反映你的程序集并将其分解为你的源代码。像 Dotfuscator 这样的混淆工具将使人们更难真正阅读反汇编代码,其中几乎所有人类可读的名称都可以被无意义的符号替换。

如果你在任何地方发布你的代码,如果有人有足够的决心,他们将能够对其进行逆向工程。你能做的最好的事情就是让他们不值得花时间这样做。

Unfortunately, there is no way to prevent somebody reflecting your assembly and dissasembling it down to your source code. Obfuscation tools like Dotfuscator will make it significantly harder for somebody to actually read the disassembled code, where virtually all human-readable names can be replaced by meaningless symbols.

If you are releasing your code anywhere, if somebody is determined enough they will be able to reverse-engineer it. The best you can do is make it not worth their time to do so.

最冷一天 2024-08-09 21:59:48

Visual Studio 附带的版本是有限的,如果您需要将某些内容部署到客户站点,我不会依赖它进行全面混淆。您可能想要查看的免费网站是 Eazfuscator.net

The version that comes with Visual Studio is limited and I wouldn't rely on it for full-scale obfuscation if you need to deploy something to customer sites. A free one that you might want to look at is Eazfuscator.net.

混浊又暗下来 2024-08-09 21:59:48

Dotfuscator 只是使反编译的源代码更难阅读 - 它不会阻止反编译本身。

Dotfuscator simply makes the decompiled source harder to read - it doesn't prevent decompilation itself.

治碍 2024-08-09 21:59:48

如果您有 Professional 或 Gold Dotfuscator,您可以阻止 Reflector 程序打开您的程序集。

if you have Professional or Gold Dotfuscator you can block Reflector program from opening your assebmlies.

~没有更多了~
我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
原文