How did Remotesoft did Protecter software? Hiding codes...Wow!

  • Thread starter Thread starter Guest
  • Start date Start date
G

Guest

Hi,

I saw this link:

http://www.remotesoft.com/salamander/protector.html

and the screenshots

http://www.remotesoft.com/salamander/protector/screenshots/index.html#code_protection

I wonder how they did this:

Our protector is not an obfuscator, rather it converts the decompilable
Microsoft Intermediate Language code (MSIL or CIL) of your assemblies into
native format while keeping all .NET metadata intact, and thus it provides
the same level of protection as native C/C++ code.

Before:
IL_0000: ldstr "Hello World using C#!"
IL_0005: call void [mscorlib]System.Console::WriteLine(string)
IL_00a: ret

After:
00000000 mov eax,dword ptr ds:[20004000h]
00000006 mov ecx,dword ptr [eax]
00000008 mov eax,dword ptr ds:[200046C0h]
0000000e call dword ptr [eax]
00000020 ret

Basically that is what my boss want me to achieve. Yes, we are considering
that software now, but my curiousity, how did they do that?

How does a person converts IL to native format? That is amazing!

They can even hide resources, and strings. Wow!

Hmm.... what do you think, anyone?

Yeah my company is evaluating protector right now. Very impress! But as a
developer and hobbyist, I am super interested on how they did that?

Hmm.. i also wonder whether Protector or Salamander is done in C++ or .NET
itself?

Cheers.
 
Hi,

Our company is considering purchasing a license for Salamander Protector as
well. Would appreciate if you could share the results of your evaluation and
if you eventually licensed it.

Neo
 
Back
Top