Topic: Code Obfuscators
Does anyone know of any tell-tale signs that may indicate what kind of code obfuscator may have been used to generate a binary? I'm sure that you could look at what kind of code obfuscation that is being done (e.g. control flow obfuscation, stack built strings, constant obfuscation, etc...), but I wonder if there's any way to signature what particular code obfuscator was used to generate a binary. I recently looked at something that was full of jumps (which would eventually lead to function calls). Fortunately, it wasn't as annoying as obfuscation used in SpyEyes (for anyone who has ever looked at it), and I was able to use the IDA plugin optimice to clean up the code decently.
I've done some googling and found that [Register or log in to view the URL] has some proprietary software that can be used for software protection. I also found references to some older stuff like the z0mbie mutation engine. Anyone know of any other more mainstream code obfuscators--possibly even free ones? The majority of my googles are just giving me .NET stuff, and I'm more interested in C/C++ code obfuscators.
Last edited by prot0man (2011-08-24 14:07:28)