Pack file security against Injection Tool.
Posted: Sat Oct 18, 2014 1:18 am
Hi,
I'm planning to buy a copy of Enigma(32), previously I'm using MoleBox9x, now it's insufficient and Enigma is just what I need, however I tested with demo version of Enigma 4.1, the virtual box can be still easily be extract by a certain tool via DLL Injection (you probably know the tool as I mailed to support).
With that tool any file packaging method can be restored within 3 clicks, and it kills MoleBoxPro/MoleBoxVS/EnigmaVB/BoxedApp/ThinApp/Spoon/SmartPacker/Cameyo/Evalzer packages, which is an awful threat to package security and many attemps in vain, the only thing I can do is to detect the tool title then shut my app, but the title can be easily changed so I doubt it's a safe method.
However my app relies some inline hook tool like AppLocale and NTLEA(ntlea.codeplex.com), is there any way to prevent injection and keep AppLocale/NTLEA working?
I'm planning to buy a copy of Enigma(32), previously I'm using MoleBox9x, now it's insufficient and Enigma is just what I need, however I tested with demo version of Enigma 4.1, the virtual box can be still easily be extract by a certain tool via DLL Injection (you probably know the tool as I mailed to support).
With that tool any file packaging method can be restored within 3 clicks, and it kills MoleBoxPro/MoleBoxVS/EnigmaVB/BoxedApp/ThinApp/Spoon/SmartPacker/Cameyo/Evalzer packages, which is an awful threat to package security and many attemps in vain, the only thing I can do is to detect the tool title then shut my app, but the title can be easily changed so I doubt it's a safe method.
However my app relies some inline hook tool like AppLocale and NTLEA(ntlea.codeplex.com), is there any way to prevent injection and keep AppLocale/NTLEA working?