Summary of your approach to reverse engineering

Assignment Help Other Engineering
Reference no: EM131434181

The aim of this assignment is to reverse-engineer a given Windows PE Executable. Every student is given her or his own executable. The archive with all the executables is attached to this assignment.

Download the executables.zip archive and unzip it somewhere. Inside you will find executable files with names like NNNNNNNN.exe, where NNNNNNNN is an 8-digit student ID number. Locate the EXE file with your student number - that is the file that you need to reverse engineer.

(For example if my student number was 13244589, I would need to choose file 13244589.exe)

You can use IdaPro Free, OllyDbg or any other software that you may find useful to accomplish reverse engineering.

Some .EXE files in the archive access an online repository. Pleae DO NOT try to access that service. The entire content of the repository is contained in the file online.zip attached to this assignment.

Expected outcomes:

You are expected to produce the report containing:

1. Summary of your approach to reverse engineering (1-2 pages max)

2. Variables defined in the program: their purpose, content, and structure

3. Overall algorithm of the program (a flow chart of the main() function).

4. Detailed de-obfuscation algorithm(s) of any data obfuscation function(s) that you may encounter, and the de-obfuscated data they produce. Here I need an equivalent  C/Java code or detailed pseudo-code (at the byte manipulation level).

5. Algorithms of other (non-standard) functions comprising the program. This can be defined at the high level (i.e. a flow chart) in terms of what standard functions they call with what parameters and what effects these calls produce.

Attachment:- Assignment Files.rar

Reference no: EM131434181

Questions Cloud

Discuss two international events involving the us military : Discuss two international events involving the US military from the past five (5) years that can be traced back to a foreign policy created after the Civil War.
Discuss whether or not humans should strive to preserve : Additionally, discuss whether or not humans should strive to preserve representative samples of all biomes on the planet, and if so, how that might be accomplished.
Analyze various elements of film : you have been writing essays and participating in discussion forums that analyze various elements of film such as theme, cinematic techniques, and genre. It is now time to combine those elements into a comprehensive analysis of one movie.
Research regulations and health law on fraud and abuse : Research regulations and health law on fraud and abuse. Examine how health law has changed over the past several decades to address fraud and abuse. Then evaluate the effectiveness of these efforts and analyze why they have and/or have not been ef..
Summary of your approach to reverse engineering : You are expected to produce the report containing: Summary of your approach to reverse engineering (1-2 pages max) Variables defined in the program: their purpose, content, and structure. Overall algorithm of the program (a flow chart of the main() f..
Discuss the importance of technological advancements : discuss the importance of technological advancements to its success as a mode of storytelling. How might it have been told differently, for better or worse, without these technological advancements?
Discuss folletts view of managing conflict : Discuss Follett's view of managing conflict and provide an example. Discuss strategic alliance and explain the difficulties and opportunities that may occur during an acquisition or merger. Explain the three types of leadership and discuss which type..
Data mining in relationship with data warehousing : Where do you see the future of Data mining in relationship with data warehousing in next ten years.
Describe how cnidarians and ctenophores are similar : Describe how Cnidarians and Ctenophores are similar. How are they different? Sea anemones compete for space and this was covered in lecture. Describe how they ‘wage war'.

Reviews

len1434181

3/20/2017 7:51:28 AM

The aim of this assignment is to reverse-engineer a given Windows PE Executable. Every student is given her or his own executable. The archive with all the executables is attached to this assignment. Your report should identify all relevant constants (strings and numbers) used in Sections 3-5. Please DO NOT include the verbatim obfuscated data into your report, except as short fragments to illustrate operation of the de-obfuscation algorithms. Please chose the last executable 11286628. Thanks.

Write a Review

 

Other Engineering Questions & Answers

  What is the frequency of the required dominant pole

An op amp with open-loop voltage gain of 105 and poles at 106 Hz, 107 Hz, and 108 Hz is to be compensated by the addition of a fourth dominant pole to operate stably with unity feedback (β = 1). What is the frequency of the required dominant pole?

  Difference between serial and parallel transmission

9.1 Describe the difference between serial and parallel transmission. 9.4 What is the chief characteristic of asynchronous transmission?

  Where did this ethical theory originate from

Investigate utilitarianismon the internet and answer the following questions: Where did this ethical theory originate from? What are the basic ideas of this theory

  What dead times are encountered in a heat exchange process

What dead times are encountered in a heat exchange process and what process and equipment gains affect the operation of a heat exchanger.

  Draw a truth table for a 4-bit clz circuit

Some arithmetic logic unit's implement a count leading zeros (CLZ) function that takes an unsigned 2n-bit number as input, and outputs the number of consecutive 0's from the MSB until the first 1. Draw a truth table for a 4-bit CLZ circuit

  Calculate hoop and axial stress in each section

Pressurize assembly to 100 psi. Calculate hoop and axial stress in each section. Design both bolt patterns (number and spacing) for safe operation. Justify your design. Ignore stress concentrations

  How can the magnifications be obtained

What would their fractographic appearances be, at 2× and 2000× magnification? How can these magnifications be obtained?

  Simple random sampling related issues

What type of sampling should you do? Why?

  Equilateral-triangle coordinates

Calculate the masses of the various streams per 1,000 lb of feed, all on a solvent-free basis. Solve the problem using equilateral-triangle coordinates, right-triangle coordinates, and solvent-free coordinates. Which method is best for thisexercis..

  Observe the difference between input and output

ENEE 3517- For the NOR gate, connect input B to 5V, and input A to a 0-5V, 100kHz, square wave. Display both input and output at the oscilloscope, and observe the difference between input and output.

  Find details of actual cause of failure using internet

Pick any bridge failure and find the details of actual cause of the failure using internet. Make sure that failure is due to mechanical problem. Submit links of all materials found on the internet.

  Compareand contrast ecological economics

Compareand contrast Ecological Economics and Green Economics with NeoclassicalEnvironmental Economics.  How do theirgoals and principles differ? Are any of them similar?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd