• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 589
  • Last Modified:

SHA-1 checksum vs .exe obfuscation

I have a Windows app that has been compromised (hacked).  I am looking at obfuscation but was wondering if generating a SHA-1 checksum and then checking it from within the program would suffice as far as letting me know the app has been compromised.

Comments?
0
rmmarsh
Asked:
rmmarsh
  • 3
  • 3
1 Solution
 
brendonfeeleyCommented:
File hashing will let you know whether or not it is different to known hashes for that file. However, it won't tell you what has changed or how it was done.

What do you mean when you say it "has been compromised"? How do you know?
0
 
rmmarshAuthor Commented:
The guy has access to functions that are only available with a license, which he has not purchased.  I send a response to his email saying something was not working as it should, and I responded that he shouldn't even have access to that function... haven't heard from him since. :D

So, will it tell me if the program has been reverse-engineered?  (i.e. using .NET Reflector).  Is obfuscation better? (like Crypto Obfuscator)
0
 
brendonfeeleyCommented:
I think it's almost certain that it has been reverse engineered and/or the application has been patched in order to grant access to locked functionality. File hashing will definitely tell you if the file has been patched.
0
Never miss a deadline with monday.com

The revolutionary project management tool is here!   Plan visually with a single glance and make sure your projects get done.

 
rmmarshAuthor Commented:
So, I guess I better byte the bullet for $150 USD and buy the obfuscator...   thanks for your insight.
0
 
brendonfeeleyCommented:
There is a good article here on how to go about securing .NET code:
http://msdn.microsoft.com/en-us/magazine/cc164058.aspx
0
 
rmmarshAuthor Commented:
I saw that, plus a few others... settled on Crypto Obfuscation for .NET... seems to be the most comprehensive, plus they answered my emails right away... I like good support! :D  

Thanks again...
0
 
ozoCommented:
If the app can be compromised, what prevents the SHA checking within the program from being compromised?
0

Featured Post

Never miss a deadline with monday.com

The revolutionary project management tool is here!   Plan visually with a single glance and make sure your projects get done.

  • 3
  • 3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now