websecurity@lists.webappsec.org

The Web Security Mailing List

View all threads

Disassembling .NET Client - Security Challenge

IB
Ivan Buetler
Fri, Sep 9, 2011 6:15 AM

Hi all,

We are proud to present a new free hacking challenge! It's all about
.NET disassembling! This time, we will provide a target sample
application to hack plus a step-by-step description for novice and
intermediate users. Increase your knowledge about client security and
most importantly, enjoy this free event!

Provided Resources for this Case

---=

  • Sample Application
  • Paper explaining the Disassembling (whitepaper by Alexandre Herzog)
  • Step-by-Step instructions (only for registered Hacking-Lab users
    available, but it's free)

Abstract

---=
Always wondered what a given .NET binary does but getting to its source
using IDA Pro is too time consuming? In our brand new published paper
and hands-on example, you'll get an insight into .NET binaries, their
secrets and how to alter them to your needs while staying at a high- or
intermediate language level.

Interested? Please checkout the URL's below

https://www.hacking-lab.com/caselist/7205-disassemble-net-clients-landin
g.html

Regards
Ivan Buetler / E1
Compass Security, Switzerland

Hi all, We are proud to present a new free hacking challenge! It's all about .NET disassembling! This time, we will provide a target sample application to hack plus a step-by-step description for novice and intermediate users. Increase your knowledge about client security and most importantly, enjoy this free event! Provided Resources for this Case ================================== * Sample Application * Paper explaining the Disassembling (whitepaper by Alexandre Herzog) * Step-by-Step instructions (only for registered Hacking-Lab users available, but it's free) Abstract ================================== Always wondered what a given .NET binary does but getting to its source using IDA Pro is too time consuming? In our brand new published paper and hands-on example, you'll get an insight into .NET binaries, their secrets and how to alter them to your needs while staying at a high- or intermediate language level. Interested? Please checkout the URL's below * SHORT URL * https://www.hacking-lab.com/sh/LAE04Jf * LONG URL * https://www.hacking-lab.com/caselist/7205-disassemble-net-clients-landin g.html Regards Ivan Buetler / E1 Compass Security, Switzerland
SN
Shlomi Narkolayev
Wed, Oct 12, 2011 8:20 AM

I think better to use .net reflector for .net applications and not IDA pro.

Kind Regards,
Shlomi Narkolayev

Visit my blog: http://Narkolayev-Shlomi.blogspot.com

On Fri, Sep 9, 2011 at 8:15 AM, Ivan Buetler ivan.buetler@csnc.ch wrote:

Hi all,

We are proud to present a new free hacking challenge! It's all about
.NET disassembling! This time, we will provide a target sample
application to hack plus a step-by-step description for novice and
intermediate users. Increase your knowledge about client security and
most importantly, enjoy this free event!

Provided Resources for this Case

---=

  • Sample Application
  • Paper explaining the Disassembling (whitepaper by Alexandre Herzog)
  • Step-by-Step instructions (only for registered Hacking-Lab users
    available, but it's free)

Abstract

---=
Always wondered what a given .NET binary does but getting to its source
using IDA Pro is too time consuming? In our brand new published paper
and hands-on example, you'll get an insight into .NET binaries, their
secrets and how to alter them to your needs while staying at a high- or
intermediate language level.

Interested? Please checkout the URL's below

https://www.hacking-lab.com/caselist/7205-disassemble-net-clients-landin
g.htmlhttps://www.hacking-lab.com/caselist/7205-disassemble-net-clients-landin%0Ag.html

Regards
Ivan Buetler / E1
Compass Security, Switzerland


The Web Security Mailing List

WebSecurity RSS Feed
http://www.webappsec.org/rss/websecurity.rss

Join WASC on LinkedIn http://www.linkedin.com/e/gis/83336/4B20E4374DBA

WASC on Twitter
http://twitter.com/wascupdates

websecurity@lists.webappsec.org
http://lists.webappsec.org/mailman/listinfo/websecurity_lists.webappsec.org

I think better to use .net reflector for .net applications and not IDA pro. Kind Regards, Shlomi Narkolayev Visit my blog: http://Narkolayev-Shlomi.blogspot.com On Fri, Sep 9, 2011 at 8:15 AM, Ivan Buetler <ivan.buetler@csnc.ch> wrote: > Hi all, > > We are proud to present a new free hacking challenge! It's all about > .NET disassembling! This time, we will provide a target sample > application to hack plus a step-by-step description for novice and > intermediate users. Increase your knowledge about client security and > most importantly, enjoy this free event! > > Provided Resources for this Case > ================================== > * Sample Application > * Paper explaining the Disassembling (whitepaper by Alexandre Herzog) > * Step-by-Step instructions (only for registered Hacking-Lab users > available, but it's free) > > Abstract > ================================== > Always wondered what a given .NET binary does but getting to its source > using IDA Pro is too time consuming? In our brand new published paper > and hands-on example, you'll get an insight into .NET binaries, their > secrets and how to alter them to your needs while staying at a high- or > intermediate language level. > > > Interested? Please checkout the URL's below > * SHORT URL > * https://www.hacking-lab.com/sh/LAE04Jf > > > * LONG URL > * > https://www.hacking-lab.com/caselist/7205-disassemble-net-clients-landin > g.html<https://www.hacking-lab.com/caselist/7205-disassemble-net-clients-landin%0Ag.html> > > > Regards > Ivan Buetler / E1 > Compass Security, Switzerland > > > > > > _______________________________________________ > The Web Security Mailing List > > WebSecurity RSS Feed > http://www.webappsec.org/rss/websecurity.rss > > Join WASC on LinkedIn http://www.linkedin.com/e/gis/83336/4B20E4374DBA > > WASC on Twitter > http://twitter.com/wascupdates > > websecurity@lists.webappsec.org > http://lists.webappsec.org/mailman/listinfo/websecurity_lists.webappsec.org >