Calling opcode string discussion
#10
Thanks Charles for your offer.

However the main objective of this program "Obfuscator maker.bas" is to
obfuscate a given function's  Opcode string into a hex form as shown below

Code:
558BEC535657683F13000083EC70688712200031F656565656568B450C034508034510898568FFFFFFE90A000000EB084678744DF0DE00008B8568FFFFFF8D65F45F5E5B5DC20C0000000000

 and then to use this hex string in another program.   It would make life very difficult for hackers. 
Even if they decompile the program, they have limited means to find out what this function
is all about.  

Whereas if we were to use ASM, hackers can easily decompile it , view it and able to manipulate 
the codes directly in a linear fashion.

To add another layer of complexity we can also encrypt this hex string so that hackers will find
it next to impossible to determine its contents.  

We can also split this single hex string into several string components, encrypt these several strings. 
And at the time when we needed to run the function,  we decrypt these several string components, 
then concatenate  them into the final Opcode string.
Finally execute CALL DWORD this final opcode string  to get the obfuscated function running.
Reply


Messages In This Thread
RE: Calling opcode string discussion - by Anne Wilson - 02-04-2025, 09:17 PM

Forum Jump:


Users browsing this thread: 3 Guest(s)