Re: [softwaredev-113] Detecting if a windows executable has been tampered with

From: Blake N.
Sent on: Friday, May 16, 2014 1:09 PM
Signing won't really offer any protection (and it is really easy to get around). It was only intended to show someone that the assembly came from you. Microsoft is pretty much obsoleting this in vnext and is not recommending / signing their assemblies. The best route is to obfuscate your assemblies with a tool like Red-Gate (highly recommended).

-Blake Niemyjski

On Fri, May 16, 2014 at 12:31 PM, Paul Miller <[address removed]> wrote:

I'm looking at adding some kind of crack detection to my windows applications. For some reason I thought if I sign the .exe with SignTool, and then open up the exe in a hex editor and change some bytes around, that Windows wouldn't launch it, but that doesn't seem to be the case.

Is there some "standard" method of detecting if the binary has been tampered with, or is this something I'll need to implement myself? Otherwise, what's the point of the codesign step?


Please Note: If you hit "REPLY", your message will be sent to everyone on this mailing list ([address removed])
This message was sent by Paul Miller ([address removed]) from Madison Area Software Developers Meetup Group.
To learn more about Paul Miller, visit his/her member profile
To report this message or block the sender, please click here
To unsubscribe from special announcements from your Organizer(s), click here

Meetup, POB 4668 #37895 NY NY USA 10163 | [address removed]

People in this
Meetup are also in:

Sign up

Meetup members, Log in

By clicking "Sign up" or "Sign up using Facebook", you confirm that you accept our Terms of Service & Privacy Policy