I shouldn’t be posting this because the guy doesn’t deserve any traffic he might get by writing this. But it’s so funny that I cannot resist (yes, I’m weak).
The blog post is called “I Can Crack Your App With Just A Shell (And How To Stop Me)” and it’s available here. I especially like his advice because it shows he doesn’t know nothing about protecting apps and I have the feeling on that second article he links being a complete ripoff from one or two articles around the web. Just cut the crap and publish tutorials on interesting stuff or create some cool packers and that sort of things so we can have fun targets to reverse! Yes, this post is also crap.
Ok, back to Dtrace User guide! Almost reaching the juicy parts. I still have to find a way to make DTrace useful in reversing protections (by this I mean faster and easier than disassembling the binaries) but it will help me with this exit(173) thing (learning some stuff about OS X that I never bothered to).
Just found out two interesting links (from root labs rdist blog), one book and one article.
- Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection
- Advanced Software Protection Now (it’s from 2003 and I haven’t read it yet but it looks interesting!)