Summary of your approach to reverse engineering

Assignment Help Other Engineering
Reference no: EM131434181

The aim of this assignment is to reverse-engineer a given Windows PE Executable. Every student is given her or his own executable. The archive with all the executables is attached to this assignment.

Download the executables.zip archive and unzip it somewhere. Inside you will find executable files with names like NNNNNNNN.exe, where NNNNNNNN is an 8-digit student ID number. Locate the EXE file with your student number - that is the file that you need to reverse engineer.

(For example if my student number was 13244589, I would need to choose file 13244589.exe)

You can use IdaPro Free, OllyDbg or any other software that you may find useful to accomplish reverse engineering.

Some .EXE files in the archive access an online repository. Pleae DO NOT try to access that service. The entire content of the repository is contained in the file online.zip attached to this assignment.

Expected outcomes:

You are expected to produce the report containing:

1. Summary of your approach to reverse engineering (1-2 pages max)

2. Variables defined in the program: their purpose, content, and structure

3. Overall algorithm of the program (a flow chart of the main() function).

4. Detailed de-obfuscation algorithm(s) of any data obfuscation function(s) that you may encounter, and the de-obfuscated data they produce. Here I need an equivalent  C/Java code or detailed pseudo-code (at the byte manipulation level).

5. Algorithms of other (non-standard) functions comprising the program. This can be defined at the high level (i.e. a flow chart) in terms of what standard functions they call with what parameters and what effects these calls produce.

Attachment:- Assignment Files.rar

Reference no: EM131434181

Questions Cloud

Discuss two international events involving the us military : Discuss two international events involving the US military from the past five (5) years that can be traced back to a foreign policy created after the Civil War.
Discuss whether or not humans should strive to preserve : Additionally, discuss whether or not humans should strive to preserve representative samples of all biomes on the planet, and if so, how that might be accomplished.
Analyze various elements of film : you have been writing essays and participating in discussion forums that analyze various elements of film such as theme, cinematic techniques, and genre. It is now time to combine those elements into a comprehensive analysis of one movie.
Research regulations and health law on fraud and abuse : Research regulations and health law on fraud and abuse. Examine how health law has changed over the past several decades to address fraud and abuse. Then evaluate the effectiveness of these efforts and analyze why they have and/or have not been ef..
Summary of your approach to reverse engineering : You are expected to produce the report containing: Summary of your approach to reverse engineering (1-2 pages max) Variables defined in the program: their purpose, content, and structure. Overall algorithm of the program (a flow chart of the main() f..
Discuss the importance of technological advancements : discuss the importance of technological advancements to its success as a mode of storytelling. How might it have been told differently, for better or worse, without these technological advancements?
Discuss folletts view of managing conflict : Discuss Follett's view of managing conflict and provide an example. Discuss strategic alliance and explain the difficulties and opportunities that may occur during an acquisition or merger. Explain the three types of leadership and discuss which type..
Data mining in relationship with data warehousing : Where do you see the future of Data mining in relationship with data warehousing in next ten years.
Describe how cnidarians and ctenophores are similar : Describe how Cnidarians and Ctenophores are similar. How are they different? Sea anemones compete for space and this was covered in lecture. Describe how they ‘wage war'.

Reviews

len1434181

3/20/2017 7:51:28 AM

The aim of this assignment is to reverse-engineer a given Windows PE Executable. Every student is given her or his own executable. The archive with all the executables is attached to this assignment. Your report should identify all relevant constants (strings and numbers) used in Sections 3-5. Please DO NOT include the verbatim obfuscated data into your report, except as short fragments to illustrate operation of the de-obfuscation algorithms. Please chose the last executable 11286628. Thanks.

Write a Review

Other Engineering Questions & Answers

  Short report on current mobile technology

Short Report on Current Mobile Technology

  What are the benefits of digital manipulation

What are the benefits of digital manipulation (don't just think about photography)? What are the dangers of digital manipulation?

  Draw a gate diagram for the circuit implementing

Simplify the product of sums to give the expression with the fewest literals. Show your work. Draw a gate diagram for the circuit implementing F, based on your simplified expression

  Explain the operation of a sliding vane compressor

Explain the need for an instrument air system and explain the operation of a Sliding vane compressor.

  Find the set of rationalizable strategies

Find the set of rationalizable strategies

  What are the three simple categories of conventional welding

(a) What are the three simple categories of conventional welding? Which of the three is the cleanest and most healthful? Explain your answer (b) Why should acetylene cylinders be stored valve end up? Explain the safety measures required for the st..

  Determine the maximum output current

A logic gate drives a load, which has a resistance of 1 kΩ and a capacitance of 20 pF. The printed circuit track connecting the gate to its load has an 40 pF capacitance to ground. The output changes state from 2.5 V to 0 V in 200 ps. Determine th..

  Create a multisim schematic of each of your designs

Create a MultiSIM schematic of each of your designs. Provide a screenshot. Perform a simulation of each design to demonstrate the filter behavior. Take a screenshot.

  Write a code for rasberry pi

I have an assignment to write a code for rasberry pi. I need to boot up the rasberry pi I have and send information to be displayed on an LED board. I would need help in assigining the pins and booting the machine by tomorrow.

  Find the values of shift ns in weaves

Find the values of shift ns in weaves defines by 6/ns/1, 8/ns/1, and 9/ns/1, that feature the same property as 4/2/1 in given Exercise. Sketch these hypothetical weaves.

  What is the standard coefficient of permeability of the soil

A soil has a coefficient of permeability of 5.0 dday at 25°C. What is the standard coefficient of permeability of the soil in corresponding units and in 1/day/m2?

  Write a research paper on aortic aneurysm

Write a research paper on Aortic Aneurysm, and all that you can find on it. Second paper is on Microcontrollers going over how they work and comparing the Raspberry pi to the Arduino controller.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd