Complete Course Description
This course aims to Introduce .NET programmers to the main concepts of application hacking, and what they can do to add a protection layer for their applications in order to prevent or decrease the possibility of hacking their applications.
Part 1 :
we will have a brief introduction about .NET programming and about the security limits that it contains, and we will cover why .NET applications can be easily hacked, also we will introduce you to our sample application that we will use in this course to apply our labs on.
Part 2 :
we will cover the steps that a hacker goes into while he tries to hack an application.
1-Code Decompilation or reverse engineering.
3-Alter and rebuild a hacked version.
and we will show each step alone in a special lecture ,applying each on our sample application.
Part 3 :
We will cover application protection techniques from both sides :
Copy protection and code protection.
Then we will cover 2 of the main copy protection techniques :
1- Hardware dependent copy protection , we will show you how to create a hardware id that users will use to register your application, in a way if your application is copied to another computers , then it will not work.
2-Online activation technique, we will show you how to make your application contact another server which must be online to be registered, we will simulate this technique by using SQL server database and a small application to manage.
3-And in the bonus section we will have an overview of an advanced copy protection technique which is Asymmetric encryption protection with license file.
Then after applying copy protection , we will show you how to protect you source code from reverse engineering by obfuscating the source code.
After applying each protection technique we will test our application to see how everything is working great.
Also we will see how to merge assemblies using ILMerge tool , and we will apply assembly signing and we will learn how can it improve our application security.
This course is for beginners to introduce them to the world of Application hacking and protection.
It's the first step for any programmer or computer scientist who need to know about application hacking and protection.