<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=CRV2_FrameworkSpecIssuesASPNetRTPrevention</id>
		<title>CRV2 FrameworkSpecIssuesASPNetRTPrevention - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=CRV2_FrameworkSpecIssuesASPNetRTPrevention"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CRV2_FrameworkSpecIssuesASPNetRTPrevention&amp;action=history"/>
		<updated>2026-04-26T06:59:21Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CRV2_FrameworkSpecIssuesASPNetRTPrevention&amp;diff=154798&amp;oldid=prev</id>
		<title>Johanna Curiel at 19:15, 1 July 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CRV2_FrameworkSpecIssuesASPNetRTPrevention&amp;diff=154798&amp;oldid=prev"/>
				<updated>2013-07-01T19:15:35Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 19:15, 1 July 2013&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;del class=&quot;diffchange diffchange-inline&quot;&gt;=&lt;/del&gt;=Preventing Round Tripping Engineering=&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;=Preventing Round Tripping Engineering=&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==The importance of Obfuscation==&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==The importance of Obfuscation==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;As mentioned before , Round Tripping is indeed a technique used to reverse engineer assemblies. Therefore, if you want to avoid your assemblies being reversed engineered or even worse, that the code is victim of malicious manipulation using the ildasm and Ilasm tools, then its is advisable to apply it. There are different kinds of products that can be used for this purpose such as DeepSea, Crypto or Dotfuscator&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;As mentioned before , Round Tripping is indeed a technique used to reverse engineer assemblies. Therefore, if you want to avoid your assemblies being reversed engineered or even worse, that the code is victim of malicious manipulation using the ildasm and Ilasm tools, then its is advisable to apply it. There are different kinds of products that can be used for this purpose such as DeepSea, Crypto or Dotfuscator&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Johanna Curiel</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=CRV2_FrameworkSpecIssuesASPNetRTPrevention&amp;diff=154797&amp;oldid=prev</id>
		<title>Johanna Curiel: Created page with &quot;==Preventing Round Tripping Engineering= ==The importance of Obfuscation== As mentioned before , Round Tripping is indeed a technique used to reverse engineer assemblies. Ther...&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=CRV2_FrameworkSpecIssuesASPNetRTPrevention&amp;diff=154797&amp;oldid=prev"/>
				<updated>2013-07-01T19:15:20Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;quot;==Preventing Round Tripping Engineering= ==The importance of Obfuscation== As mentioned before , Round Tripping is indeed a technique used to reverse engineer assemblies. Ther...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==Preventing Round Tripping Engineering=&lt;br /&gt;
==The importance of Obfuscation==&lt;br /&gt;
As mentioned before , Round Tripping is indeed a technique used to reverse engineer assemblies. Therefore, if you want to avoid your assemblies being reversed engineered or even worse, that the code is victim of malicious manipulation using the ildasm and Ilasm tools, then its is advisable to apply it. There are different kinds of products that can be used for this purpose such as DeepSea, Crypto or Dotfuscator&lt;br /&gt;
&lt;br /&gt;
==Using Obfuscation==&lt;br /&gt;
&lt;br /&gt;
The most effective technique used to avoid reverse engineering and tampering of assemblies is the use of Obfuscation. Visual Studio contains a version of Dotfuscator. This program is accessible by choosing on the VS menu, Tools → Dotfuscator(Community Edition menu command). Note: This tools is not available in Express versions&lt;br /&gt;
&lt;br /&gt;
To obfuscate your assemblies :&lt;br /&gt;
*Build the project in VS Studio&lt;br /&gt;
*Tools--&amp;gt; Dotfuscator Community Edition&lt;br /&gt;
*A screen prompts asking for which project type, choose 'Creat New Project' and click OK&lt;br /&gt;
*On the Input tab of the Dotfuscator interface, click 'Browse and Add assembly to list'&lt;br /&gt;
Browse for the compiled application&lt;/div&gt;</summary>
		<author><name>Johanna Curiel</name></author>	</entry>

	</feed>