The title of this post is a partial rip-off of Dynamic Code Encryption as an Anti Dump and Anti Reverse Engineering measure blogpost. Alexey describes a technique similar to the one I used in my crackme, which isn’t altogether that new. His post is a good introduction to some possible attack vectors and what is at stake. You should give it a look.
The crackme uses a multi-layer dynamic code encryption approach, with two different encryption algorithms (Rabbit and Salsa).
Print
Share
Comment
Cite
Upload
Translate
APA
() » Dynamic Code Encryption in OS X: the crackme example!. Retrieved from https://www.truth.cx/2012/03/17/dynamic-code-encryption-in-os-x-the-crackme-example/.
MLA" » Dynamic Code Encryption in OS X: the crackme example!." - , https://www.truth.cx/2012/03/17/dynamic-code-encryption-in-os-x-the-crackme-example/
HARVARD » Dynamic Code Encryption in OS X: the crackme example!., viewed ,
VANCOUVER - » Dynamic Code Encryption in OS X: the crackme example!. [Internet]. [Accessed ]. Available from: https://www.truth.cx/2012/03/17/dynamic-code-encryption-in-os-x-the-crackme-example/
CHICAGO" » Dynamic Code Encryption in OS X: the crackme example!." - Accessed . https://www.truth.cx/2012/03/17/dynamic-code-encryption-in-os-x-the-crackme-example/
IEEE" » Dynamic Code Encryption in OS X: the crackme example!." [Online]. Available: https://www.truth.cx/2012/03/17/dynamic-code-encryption-in-os-x-the-crackme-example/. [Accessed: ]