Re: Perlapp reverse engineering.
On Wed, 30 Jul 2003 10:50:15 +0100, Beckett Richard-qswi266 <[EMAIL PROTECTED]> wrote: >> Run a debugger. Break right after perl_parse. Dump the OP tree >> and feed it to B::Deparse. I have verified this method's validity >> with the author of PerlApp. :-) > >Erm... ?:-) I talked with Autrijus earlier this month, and we both agreed that there is *no* way to make the Perl source code unavailable to a determined hacker. You could use encryption and require a passphrase every time the executable is run, but this will still not protect you from those who must know the passphrase. The only viable option would be to execute the Perl code on _your_ server and let the client only access it as a web service. I don't think it would be possible to create _any_ source code hiding scheme for Perl that would take me more than 1-2 days to break (on Windows, it may take me longer on other platforms due to tool availability/familiarity). This assumes that I can execute the application normally on my machine. And no, this doesn't mean I challenge people to prove me wrong; I wouldn't actually want to spend/waste the time demonstrating this. >> --- >> >> There's also an executable that's supposed to convert a >> perlapp back to perl >> code at: >> http://robgil.hypermart.net/w32perl/Exec2pl.exe >> >> I don't know if it works. > >I just tried it. It says that it works with .exes generated by perl2exe. It >doesn't work with perlapp .exe files, though. :-( Nobody has bothered to invest the time into cracking the PerlApp 4 or PerlApp 5 schemes as far as I know. If you can *prove* that the code inside the application has been written by you, and it is only the main script and not all the bundled modules that you need, then I can help you. Send me private email with a description of the script and attach the actual executable. Cheers, -Jan PS: Please send questions about PerlApp (or other PDK tools) to the PDK mailing list and not to the Perl-Win32-Users one. ___ Perl-Win32-Users mailing list [EMAIL PROTECTED] To unsubscribe: http://listserv.ActiveState.com/mailman/mysubs
RE: Perlapp reverse engineering.
> Run a debugger. Break right after perl_parse. Dump the OP tree > and feed it to B::Deparse. I have verified this method's validity > with the author of PerlApp. :-) Erm... ?:-) > --- > > There's also an executable that's supposed to convert a > perlapp back to perl > code at: > http://robgil.hypermart.net/w32perl/Exec2pl.exe > > I don't know if it works. I just tried it. It says that it works with .exes generated by perl2exe. It doesn't work with perlapp .exe files, though. :-( Thanks. R. ___ Perl-Win32-Users mailing list [EMAIL PROTECTED] To unsubscribe: http://listserv.ActiveState.com/mailman/mysubs
Re: Reverse Engineering
At 12:06 2002-05-13 +0100, Batchelor, Gareth wrote: >I recently used PerlApp to create a Win32 executable from a perl script that >I wrote. Unfortunately I have just lost the source code, and I would like to >find out if there is any way for me to obtain the code from the executable. >Does anyone know if this can be done? This was discussed at PerlMonks: http://www.perlmonks.org/index.pl?node_id=96925 http://www.perlmonks.org/index.pl?node_id=97005 Note that this relates to PDK 3, and if you use the latest version of PerlApp it may not apply. I don't think the source is extracted to disk, only the DLLs (they are also left behind in a temp directory after the program is done which is kind of sloppy (this goes for PDK 3)). /J -- --- -- -- -- -- - - - Johan LindströmSourcerer @ Boss Casinos [EMAIL PROTECTED] Latest bookmark: "Downright useful downloads" http://www.answersthatwork.com/downright.htm dmoz (1 of 10): /Arts/Music/Reviews/Independent_or_Alternative ___ Perl-Win32-Users mailing list [EMAIL PROTECTED] To unsubscribe: http://listserv.ActiveState.com/mailman/mysubs
RE: Reverse Engineering
I seem to remember from using an older version of PerlApp that it actually extracted the perl source into temporary files when it ran. If this is still true, it might be possible to locate the temporary files... I have to admit, this is a shot in the dark for me, because that was a looong time ago. jpt > -Original Message- > From: Batchelor, Gareth [mailto:[EMAIL PROTECTED]] > Sent: Monday, May 13, 2002 7:07 AM > To: '[EMAIL PROTECTED]' > Subject: Reverse Engineering > > > Hi, > > I recently used PerlApp to create a Win32 executable from a > perl script that > I wrote. Unfortunately I have just lost the source code, and > I would like to > find out if there is any way for me to obtain the code from > the executable. > Does anyone know if this can be done? > > TIA > Gareth > > > ** > ** > " This message contains information that may be privileged or > confidential and > is the property of the Cap Gemini Ernst & Young Group. It is > intended only for > the person to whom it is addressed. If you are not the > intended recipient, you > are not authorized to read, print, retain, copy, disseminate, > distribute, or use > this message or any part thereof. If you receive this message > in error, please > notify the sender immediately and delete all copies of this message ". > ** > ** > ___ > Perl-Win32-Users mailing list > [EMAIL PROTECTED] > To unsubscribe: http://listserv.ActiveState.com/mailman/mysubs > ___ Perl-Win32-Users mailing list [EMAIL PROTECTED] To unsubscribe: http://listserv.ActiveState.com/mailman/mysubs
Reverse Engineering
Hi, I recently used PerlApp to create a Win32 executable from a perl script that I wrote. Unfortunately I have just lost the source code, and I would like to find out if there is any way for me to obtain the code from the executable. Does anyone know if this can be done? TIA Gareth " This message contains information that may be privileged or confidential and is the property of the Cap Gemini Ernst & Young Group. It is intended only for the person to whom it is addressed. If you are not the intended recipient, you are not authorized to read, print, retain, copy, disseminate, distribute, or use this message or any part thereof. If you receive this message in error, please notify the sender immediately and delete all copies of this message ". ___ Perl-Win32-Users mailing list [EMAIL PROTECTED] To unsubscribe: http://listserv.ActiveState.com/mailman/mysubs