Re: Perlapp reverse engineering.

2003-07-30 Thread Jan Dubois
On Wed, 30 Jul 2003 10:50:15 +0100, Beckett Richard-qswi266
<[EMAIL PROTECTED]> wrote:

>> Run a debugger.  Break right after perl_parse.  Dump the OP tree
>> and feed it to B::Deparse.  I have verified this method's validity
>> with the author of PerlApp. :-)
>
>Erm... ?:-)

I talked with Autrijus earlier this month, and we both agreed that there
is *no* way to make the Perl source code unavailable to a determined
hacker.  You could use encryption and require a passphrase every time the
executable is run, but this will still not protect you from those who must
know the passphrase.  The only viable option would be to execute the Perl
code on _your_ server and let the client only access it as a web service.

I don't think it would be possible to create _any_ source code hiding
scheme for Perl that would take me more than 1-2 days to break (on
Windows, it may take me longer on other platforms due to tool
availability/familiarity).  This assumes that I can execute the
application normally on my machine.

And no, this doesn't mean I challenge people to prove me wrong; I wouldn't
actually want to spend/waste the time demonstrating this.

>> ---
>> 
>> There's also an executable that's supposed to convert a 
>> perlapp back to perl
>> code at:
>> http://robgil.hypermart.net/w32perl/Exec2pl.exe
>> 
>> I don't know if it works.
>
>I just tried it. It says that it works with .exes generated by perl2exe. It
>doesn't work with perlapp .exe files, though. :-(

Nobody has bothered to invest the time into cracking the PerlApp 4 or
PerlApp 5 schemes as far as I know.

If you can *prove* that the code inside the application has been written
by you, and it is only the main script and not all the bundled modules
that you need, then I can help you.  Send me private email with a
description of the script and attach the actual executable.

Cheers,
-Jan

PS: Please send questions about PerlApp (or other PDK tools) to the PDK
mailing list and not to the Perl-Win32-Users one.
___
Perl-Win32-Users mailing list
[EMAIL PROTECTED]
To unsubscribe: http://listserv.ActiveState.com/mailman/mysubs


RE: Perlapp reverse engineering.

2003-07-30 Thread Beckett Richard-qswi266
> Run a debugger.  Break right after perl_parse.  Dump the OP tree
> and feed it to B::Deparse.  I have verified this method's validity
> with the author of PerlApp. :-)

Erm... ?:-)

> ---
> 
> There's also an executable that's supposed to convert a 
> perlapp back to perl
> code at:
> http://robgil.hypermart.net/w32perl/Exec2pl.exe
> 
> I don't know if it works.

I just tried it. It says that it works with .exes generated by perl2exe. It
doesn't work with perlapp .exe files, though. :-(

Thanks.

R.
___
Perl-Win32-Users mailing list
[EMAIL PROTECTED]
To unsubscribe: http://listserv.ActiveState.com/mailman/mysubs


Re: Reverse Engineering

2002-05-13 Thread Johan Lindstrom

At 12:06 2002-05-13 +0100, Batchelor, Gareth wrote:
>I recently used PerlApp to create a Win32 executable from a perl script that
>I wrote. Unfortunately I have just lost the source code, and I would like to
>find out if there is any way for me to obtain the code from the executable.
>Does anyone know if this can be done?

This was discussed at PerlMonks:
http://www.perlmonks.org/index.pl?node_id=96925
http://www.perlmonks.org/index.pl?node_id=97005

Note that this relates to PDK 3, and if you use the latest version of 
PerlApp it may not apply.

I don't think the source is extracted to disk, only the DLLs (they are also 
left behind in a temp directory after the program is done which is kind of 
sloppy (this goes for PDK 3)).


/J

 --  --- -- --  --  -- -  - -
Johan LindströmSourcerer @ Boss Casinos [EMAIL PROTECTED]

Latest bookmark: "Downright useful downloads"
http://www.answersthatwork.com/downright.htm
dmoz (1 of 10): /Arts/Music/Reviews/Independent_or_Alternative


___
Perl-Win32-Users mailing list
[EMAIL PROTECTED]
To unsubscribe: http://listserv.ActiveState.com/mailman/mysubs



RE: Reverse Engineering

2002-05-13 Thread Tillman, James

I seem to remember from using an older version of PerlApp that it actually
extracted the perl source into temporary files when it ran.  If this is
still true, it might be possible to locate the temporary files...

I have to admit, this is a shot in the dark for me, because that was a
looong time ago.

jpt

> -Original Message-
> From: Batchelor, Gareth [mailto:[EMAIL PROTECTED]]
> Sent: Monday, May 13, 2002 7:07 AM
> To: '[EMAIL PROTECTED]'
> Subject: Reverse Engineering
> 
> 
> Hi,
> 
> I recently used PerlApp to create a Win32 executable from a 
> perl script that
> I wrote. Unfortunately I have just lost the source code, and 
> I would like to
> find out if there is any way for me to obtain the code from 
> the executable.
> Does anyone know if this can be done?
> 
> TIA
> Gareth
> 
> 
> **
> **
> " This message contains information that may be privileged or 
> confidential and 
> is the property of the Cap Gemini Ernst & Young Group. It is 
> intended only for 
> the person to whom it is addressed. If you are not the 
> intended recipient, you 
> are not authorized to read, print, retain, copy, disseminate, 
> distribute, or use 
> this message or any part thereof. If you receive this message 
> in error, please 
> notify the sender immediately and delete all copies of this message ".
> **
> **
> ___
> Perl-Win32-Users mailing list
> [EMAIL PROTECTED]
> To unsubscribe: http://listserv.ActiveState.com/mailman/mysubs
> 
___
Perl-Win32-Users mailing list
[EMAIL PROTECTED]
To unsubscribe: http://listserv.ActiveState.com/mailman/mysubs



Reverse Engineering

2002-05-13 Thread Batchelor, Gareth

Hi,

I recently used PerlApp to create a Win32 executable from a perl script that
I wrote. Unfortunately I have just lost the source code, and I would like to
find out if there is any way for me to obtain the code from the executable.
Does anyone know if this can be done?

TIA
Gareth



" This message contains information that may be privileged or confidential and 
is the property of the Cap Gemini Ernst & Young Group. It is intended only for 
the person to whom it is addressed. If you are not the intended recipient, you 
are not authorized to read, print, retain, copy, disseminate, distribute, or use 
this message or any part thereof. If you receive this message in error, please 
notify the sender immediately and delete all copies of this message ".

___
Perl-Win32-Users mailing list
[EMAIL PROTECTED]
To unsubscribe: http://listserv.ActiveState.com/mailman/mysubs