(04-30-2013, 03:08 PM)i0xIllusi0n Wrote: So you realize it was obfuscated, and since you don't like me, you post about me being a leecher when really you didn't even have proof, and in the end there was no code that was leeched. Visual Studio default code that it adds to different namespaces are given to everyone. So I'm not a leecher at all, don't say I am.
Again, can you not read my posts? I posted because it was what I was seeing that looked like code I have seen before? I didn't have any proof? I showed you I had the source...? The deobfuscator creates code that it can't interpret based on the methods you are using to make sense of the obfuscation itself, but puts that in it's own autogenerated namespace. This is not the case for every assembly which is obfuscated though, so it looked promising.
Quote:Visual Studio default code that it adds to different namespaces are given to everyone
That's not what this is either.
edit: And I have seen your coding ability on a few other forums as well so I didn't trust that you were capable of the code I was seeing either to be honest.
When you call to compute the hash with the BitConverter you don't need to call String.ToUpper() also. And you should be disposing of the CryptoServiceProvider objects. Same thing with your StreamReader. There's also a reason why things like this are bad:
Code:
try
{
int num = Convert.ToInt32({string_variable});
...
}
catch (Exception exception)
{
}
int.TryParse()?
I know you mentioned writing this in VB.NET, but just the same, you're using an empty catch block for starters, and the wrong method here if you're expecting to just eat the error up like it never happened.
If you want an explanation for why I thought this was leeched, then here it is. Things like this, and based on the other code I seen, didn't paint a pretty picture.