Click here to Skip to main content
15,860,972 members
Articles / Programming Languages / MSIL

Building Security Awareness in .NET Assemblies : Part 3 - Learn to break Strong Name .NET Assemblies

Rate me:
Please Sign up or sign in to vote.
4.72/5 (94 votes)
31 Oct 20043 min read 455.7K   1.3K   95   68
Building Security Awareness in .NET Assemblies : Part 3 of 3

Disclaimer

NeCoders shall not be held responsible for any cases of software/files being hacked due to the information provided in this article.

General Overview

Welcome back to part 3 of the Building Security Awareness in .Net Assemblies series. In this article, I will share with you the possibility of breaking Strong Named .Net Assemblies. Make sure you have already read through part 1 and 2 before continuing on.

Questions pertaining to Strong Name

I do believe many others have the same doubts as I do on whether Strong Name keys could really protect the assembly from being tampered. I would like to share my doubts with you in this article.

Questions:

  1. Question : Is Strong Name key secure?
    • Answer : Yes, Strong Name key uses RSA 1024 bit encryption.
  2. Question : Is Strong Name key breakable?
    • Answer : If you have enough computing power, time and knowledge on how to break RSA, the answer is yes.
  3. Question : Can Strong Name key be removed from .NET assemblies?
    • Answer : Yes, it can be removed very easily if you know how.

The Demonstration Test machine specifications :

  • Windows XP Professional Edition SP 1 1

  • Intel Pentium 4 2.6GHz

  • 256MB DDR-RAM

  • Visual Studio .Net 2003 Professional Edition

  • Microsoft .Net Framework 1.1
  1. Download the executable files that come with this article.
  2. Open your Visual Studio .Net 2003 command prompt.
  3. Make sure you are inside the CrackingIL/bin/debug directory.
  4. Type “ildasm CrackingIL.exe /out=CrackingIL.il”.

Image 1

  1. You must be wondering, why we are repeating what we had done in part 1 and part 2 of the series. If you notice, the way to break Strong Name keys is by manipulating the Intermediate Language. But the problem is in part 2, we did modify the Intermediate Language and at the end when we tried to convert it back to an assembly, we will receive an error. I will explain in detail on which part of the Intermediate Language that you should modified to remove the Strong Name key.
  2. Open up the CrackingIL.il with a text editor. I use notepad.

Image 2

  1. Take a look at the red boxes. From what I understand, each assemblies like System.Windows.Forms, System and mscorlib contains their own public key token and version number.
  2. Now, does our assembly contain a public key? The answer is yes. Before showing it to you, I will first show you 2 screenshots; one without Strong Name key and one with Strong Name key attached.

Without Strong Name :

Image 3

With Strong Name :

Image 4

  1. You will notice that the difference on both sides is that the Strong Name key assembly contains a public key. In order to tamper a Strong Named .Net Assembly, just remove that highlighted section. It will look like this.

Image 5

  1. Now do some modifications to the existing Intermediate Language. You have to remove the registry checking so it will not prompt you for serial number or license. Look for this code.

Image 6

  1. Then remove the lines of code from IL_0000 to IL_0075. You should have an output like this.

Image 7

  1. Now just edit some text to prove that you have hijacked that Strong Named key .Net Assembly. Find the code with the phrase “Welcome to NeCoders” and replace it to “You are being hijacked, Strong Names are useless here”.

Image 8

Change above to:

Image 9

  1. Open your Visual Studio .Net 2003 command prompt, and type “ilasm CrackingIL.il”.

Image 10

  1. Try to run CrackingIL.exe. You will see this.

Image 11

  1. Congratulations! You had managed to manipulate .Net assemblies with Strong Name key attached to it.

Conclusion

Again, I hope you find this series of the article to be interesting. There will be more articles under this series, in terms of breaking and securing the .Net assemblies. Do check out article 4 when it is available as it will explaining the many theories in .NET security. This in return should provide you with a better understanding in this topic.

References

None

License

This article has no explicit license attached to it but may contain usage terms in the article text or the download files themselves. If in doubt please contact the author via the discussion board below.

A list of licenses authors might use can be found here


Written By
Software Developer
Malaysia Malaysia
I am Chua Wen Ching and it is great to be part of CodeProject network Smile | :)

Comments and Discussions

 
GeneralRe: Missunderstanding to strong names Pin
Chua Wen Ching11-Nov-04 15:05
Chua Wen Ching11-Nov-04 15:05 
GeneralRe: Missunderstanding to strong names Pin
Jan Seda11-Nov-04 15:42
professionalJan Seda11-Nov-04 15:42 
GeneralRe: Missunderstanding to strong names Pin
Chua Wen Ching11-Nov-04 15:53
Chua Wen Ching11-Nov-04 15:53 
GeneralRe: Strong names Pin
Kurt H11-Nov-04 9:58
Kurt H11-Nov-04 9:58 
GeneralRe: Strong names Pin
Hugo Hallman11-Nov-04 10:10
Hugo Hallman11-Nov-04 10:10 
GeneralRe: Strong names Pin
Kurt H11-Nov-04 10:52
Kurt H11-Nov-04 10:52 
GeneralRe: Strong names Pin
Chua Wen Ching11-Nov-04 15:10
Chua Wen Ching11-Nov-04 15:10 
GeneralXenoCode Pin
staceyw9-Nov-04 8:40
staceyw9-Nov-04 8:40 
Just curious if you could crack the XenoCode obfuscator with control flow obfuscation and the IL breaker turned on. If so, that would be good to know.
Get a XenoCode trial at http://www.xenocode.com to test your assembly and try to crack it. I am not associated with them, just curious as I have their product. Cheers!

--
William Stacey, MVP
http://mvp.support.microsoft.com
GeneralRe: XenoCode Pin
Chua Wen Ching9-Nov-04 12:20
Chua Wen Ching9-Nov-04 12:20 
GeneralRe: XenoCode Pin
Shaun Wilde25-Nov-04 20:50
Shaun Wilde25-Nov-04 20:50 
GeneralRe: XenoCode Pin
Chua Wen Ching25-Nov-04 21:25
Chua Wen Ching25-Nov-04 21:25 
GeneralRe: XenoCode Pin
Frank Hileman9-Jul-05 5:55
Frank Hileman9-Jul-05 5:55 
GeneralPotential problem with method Pin
Etienne Fortin9-Nov-04 5:03
Etienne Fortin9-Nov-04 5:03 
GeneralRe: Potential problem with method Pin
Anonymous9-Nov-04 5:24
Anonymous9-Nov-04 5:24 
GeneralNice one Pin
6-Nov-04 21:06
suss6-Nov-04 21:06 
GeneralRe: Nice one Pin
Anonymous6-Nov-04 21:54
Anonymous6-Nov-04 21:54 
GeneralRe: Nice one Pin
Hugo Hallman9-Nov-04 11:32
Hugo Hallman9-Nov-04 11:32 
GeneralRe: Nice one Pin
Chua Wen Ching9-Nov-04 12:18
Chua Wen Ching9-Nov-04 12:18 
GeneralRe: Nice one Pin
rawwool (Rahul Kumar)10-Nov-04 5:58
rawwool (Rahul Kumar)10-Nov-04 5:58 
GeneralDisclaimer Pin
Horia Tudosie4-Nov-04 3:29
Horia Tudosie4-Nov-04 3:29 
GeneralRe: Disclaimer Pin
Misty_Blue11-Nov-04 11:00
Misty_Blue11-Nov-04 11:00 
GeneralGreat Job Pin
sandurea3-Nov-04 23:51
sandurea3-Nov-04 23:51 
GeneralGood article Pin
Rakker713-Nov-04 7:34
Rakker713-Nov-04 7:34 
GeneralDisturbing Pin
kaschimer2-Nov-04 9:53
kaschimer2-Nov-04 9:53 
GeneralRe: Disturbing Pin
Daniel Turini6-Nov-04 22:09
Daniel Turini6-Nov-04 22:09 

General General    News News    Suggestion Suggestion    Question Question    Bug Bug    Answer Answer    Joke Joke    Praise Praise    Rant Rant    Admin Admin   

Use Ctrl+Left/Right to switch messages, Ctrl+Up/Down to switch threads, Ctrl+Shift+Left/Right to switch pages.