SlideShare a Scribd company logo
Reverse Engineering  v/s  Secure Coding.
What is Secure Coding? Is Secure Coding simply avoiding certain already discovered vulnerable functions?  What about Tons of Commercial applications that are released everyday? Software Crackers (Reverse Engineers) causing Millions of Dollars of loss Globally due to Software Piracy. Are you Programmers taking your Job seriously?
Cryptography?...Hmm… Cryptography in Application Registration routines don’t make sense. Cryptographic Algorithm adds to the applications’ size & is Processor intense. Cryptographic Algorithm in Registration routines can be either completely  ripped off or totally bypassed and they pose no challenge to a Cracker.
Packers & Protectors? What are Packers? What are Protectors? Packers make Sense but Protectors don’t ! Packers == very easy to defeat. Protectors == who cares to defeat ? Virtual Machines?.... Not again!
.Net & Java == Not Cool? Decompilation & not Disassembling. .Net is M$’s take on Java. .class files & .net executables rely heavily on Runtime Environment Components. Damn easy to break code and Damn tough to prevent us from Tampering with your App.
Mobile Devices…. Yeah! Sony Ericsson’s “.Sest” Feature talked about for the first time ever! J2me applications built for Mobile Devices should be “Freewares”. J2me Trojans can be very easy to code. Don’t even want to talk about Sony Ericsson & Siemens’ “Phone Modding”.
Can I Tackle R.E ? Technically Speaking? No you Can’t! Logically ? Bore us to Death! How? a] Use spaghetti Code. b] Jump all over the Place. c] Learn Polymorphism. d] Learn to use your “Imagination” as a tool. e] Think like a Reverse Engineer!
“ Thinking Before Writing, saves the time spent in Editing.” –Pirated. Thank You. Atul Alex Cherian, www.OrchidSeven.com . Ph:9860056788. [email_address]

More Related Content

PPTX
George - Computer Bug
PDF
ASFWS 2011 : Code obfuscation: Quid Novi ?
PPTX
Software Protection Techniques
PDF
Appsec obfuscator reloaded
PPTX
Reverse engineering power point!
PDF
uBox Point of Sale
PPT
Obfuscator
PPT
Code obfuscation
George - Computer Bug
ASFWS 2011 : Code obfuscation: Quid Novi ?
Software Protection Techniques
Appsec obfuscator reloaded
Reverse engineering power point!
uBox Point of Sale
Obfuscator
Code obfuscation

Similar to Reverse Engineering v/s Secure Coding (20)

PPTX
BSides Algiers - Reversing Win32 applications - Yacine Hebbal
PDF
Software potential code protector
PDF
Software Reverse Engineering in a Security Context
PPTX
Reverse Engineering .NET and Java
PPTX
Reverse Engineering - Protecting and Breaking the Software
PDF
Cracking the mobile application code
PDF
Smart Phones Dumb Apps
PPT
Reverse engineering
PPTX
Reverse Engineering.pptx
PDF
V4I5201571
PPTX
Reverse Engineering: Protecting and Breaking the Software
PPTX
(Workshop) Reverse Engineering - Protecting and Breaking the Software
PDF
Secure .NET programming
PPTX
Reverse Engineering: Protecting and Breaking the Software (Workshop)
PDF
Demystifying dot NET reverse engineering - Part1
PPTX
Keynote Rockford Lhotka on the Microsoft Development Platftorm
PPTX
Introduction to Software Reverse Engineering
PPT
Csharp dot net
PDF
IRJET- Obfuscation: Maze of Code
PDF
Software cracking and patching
BSides Algiers - Reversing Win32 applications - Yacine Hebbal
Software potential code protector
Software Reverse Engineering in a Security Context
Reverse Engineering .NET and Java
Reverse Engineering - Protecting and Breaking the Software
Cracking the mobile application code
Smart Phones Dumb Apps
Reverse engineering
Reverse Engineering.pptx
V4I5201571
Reverse Engineering: Protecting and Breaking the Software
(Workshop) Reverse Engineering - Protecting and Breaking the Software
Secure .NET programming
Reverse Engineering: Protecting and Breaking the Software (Workshop)
Demystifying dot NET reverse engineering - Part1
Keynote Rockford Lhotka on the Microsoft Development Platftorm
Introduction to Software Reverse Engineering
Csharp dot net
IRJET- Obfuscation: Maze of Code
Software cracking and patching
Ad

More from amiable_indian (20)

PDF
Phishing As Tragedy of the Commons
PDF
Cisco IOS Attack & Defense - The State of the Art
PDF
Secrets of Top Pentesters
PPS
Workshop on Wireless Security
PDF
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
PPS
Workshop on BackTrack live CD
PPS
Reverse Engineering for exploit writers
PPS
State of Cyber Law in India
PPS
AntiSpam - Understanding the good, the bad and the ugly
PPS
Network Vulnerability Assessments: Lessons Learned
PPS
Economic offenses through Credit Card Frauds Dissected
PPS
Immune IT: Moving from Security to Immunity
PPS
Reverse Engineering for exploit writers
PPS
Hacking Client Side Insecurities
PDF
Web Exploit Finder Presentation
PPT
Network Security Data Visualization
PPT
Enhancing Computer Security via End-to-End Communication Visualization
PDF
Top Network Vulnerabilities Over Time
PDF
What are the Business Security Metrics?
PPT
No Substitute for Ongoing Data, Quantification, Visualization, and Story-Telling
Phishing As Tragedy of the Commons
Cisco IOS Attack & Defense - The State of the Art
Secrets of Top Pentesters
Workshop on Wireless Security
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
Workshop on BackTrack live CD
Reverse Engineering for exploit writers
State of Cyber Law in India
AntiSpam - Understanding the good, the bad and the ugly
Network Vulnerability Assessments: Lessons Learned
Economic offenses through Credit Card Frauds Dissected
Immune IT: Moving from Security to Immunity
Reverse Engineering for exploit writers
Hacking Client Side Insecurities
Web Exploit Finder Presentation
Network Security Data Visualization
Enhancing Computer Security via End-to-End Communication Visualization
Top Network Vulnerabilities Over Time
What are the Business Security Metrics?
No Substitute for Ongoing Data, Quantification, Visualization, and Story-Telling
Ad

Recently uploaded (20)

PPTX
Spectroscopy.pptx food analysis technology
PDF
KodekX | Application Modernization Development
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Transforming Manufacturing operations through Intelligent Integrations
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPTX
Cloud computing and distributed systems.
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
madgavkar20181017ppt McKinsey Presentation.pdf
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Sensors and Actuators in IoT Systems using pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
Spectroscopy.pptx food analysis technology
KodekX | Application Modernization Development
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Transforming Manufacturing operations through Intelligent Integrations
Advanced methodologies resolving dimensionality complications for autism neur...
Empathic Computing: Creating Shared Understanding
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Cloud computing and distributed systems.
Network Security Unit 5.pdf for BCA BBA.
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
20250228 LYD VKU AI Blended-Learning.pptx
madgavkar20181017ppt McKinsey Presentation.pdf
GamePlan Trading System Review: Professional Trader's Honest Take
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Sensors and Actuators in IoT Systems using pdf
Machine learning based COVID-19 study performance prediction
Diabetes mellitus diagnosis method based random forest with bat algorithm

Reverse Engineering v/s Secure Coding

  • 1. Reverse Engineering v/s Secure Coding.
  • 2. What is Secure Coding? Is Secure Coding simply avoiding certain already discovered vulnerable functions? What about Tons of Commercial applications that are released everyday? Software Crackers (Reverse Engineers) causing Millions of Dollars of loss Globally due to Software Piracy. Are you Programmers taking your Job seriously?
  • 3. Cryptography?...Hmm… Cryptography in Application Registration routines don’t make sense. Cryptographic Algorithm adds to the applications’ size & is Processor intense. Cryptographic Algorithm in Registration routines can be either completely ripped off or totally bypassed and they pose no challenge to a Cracker.
  • 4. Packers & Protectors? What are Packers? What are Protectors? Packers make Sense but Protectors don’t ! Packers == very easy to defeat. Protectors == who cares to defeat ? Virtual Machines?.... Not again!
  • 5. .Net & Java == Not Cool? Decompilation & not Disassembling. .Net is M$’s take on Java. .class files & .net executables rely heavily on Runtime Environment Components. Damn easy to break code and Damn tough to prevent us from Tampering with your App.
  • 6. Mobile Devices…. Yeah! Sony Ericsson’s “.Sest” Feature talked about for the first time ever! J2me applications built for Mobile Devices should be “Freewares”. J2me Trojans can be very easy to code. Don’t even want to talk about Sony Ericsson & Siemens’ “Phone Modding”.
  • 7. Can I Tackle R.E ? Technically Speaking? No you Can’t! Logically ? Bore us to Death! How? a] Use spaghetti Code. b] Jump all over the Place. c] Learn Polymorphism. d] Learn to use your “Imagination” as a tool. e] Think like a Reverse Engineer!
  • 8. “ Thinking Before Writing, saves the time spent in Editing.” –Pirated. Thank You. Atul Alex Cherian, www.OrchidSeven.com . Ph:9860056788. [email_address]