Reference no: EM131434181
The aim of this assignment is to reverse-engineer a given Windows PE Executable. Every student is given her or his own executable. The archive with all the executables is attached to this assignment.
Download the executables.zip archive and unzip it somewhere. Inside you will find executable files with names like NNNNNNNN.exe, where NNNNNNNN is an 8-digit student ID number. Locate the EXE file with your student number - that is the file that you need to reverse engineer.
(For example if my student number was 13244589, I would need to choose file 13244589.exe)
You can use IdaPro Free, OllyDbg or any other software that you may find useful to accomplish reverse engineering.
Some .EXE files in the archive access an online repository. Pleae DO NOT try to access that service. The entire content of the repository is contained in the file online.zip attached to this assignment.
Expected outcomes:
You are expected to produce the report containing:
1. Summary of your approach to reverse engineering (1-2 pages max)
2. Variables defined in the program: their purpose, content, and structure
3. Overall algorithm of the program (a flow chart of the main() function).
4. Detailed de-obfuscation algorithm(s) of any data obfuscation function(s) that you may encounter, and the de-obfuscated data they produce. Here I need an equivalent C/Java code or detailed pseudo-code (at the byte manipulation level).
5. Algorithms of other (non-standard) functions comprising the program. This can be defined at the high level (i.e. a flow chart) in terms of what standard functions they call with what parameters and what effects these calls produce.
Attachment:- Assignment Files.rar
Discuss two international events involving the us military
: Discuss two international events involving the US military from the past five (5) years that can be traced back to a foreign policy created after the Civil War.
|
Discuss whether or not humans should strive to preserve
: Additionally, discuss whether or not humans should strive to preserve representative samples of all biomes on the planet, and if so, how that might be accomplished.
|
Analyze various elements of film
: you have been writing essays and participating in discussion forums that analyze various elements of film such as theme, cinematic techniques, and genre. It is now time to combine those elements into a comprehensive analysis of one movie.
|
Research regulations and health law on fraud and abuse
: Research regulations and health law on fraud and abuse. Examine how health law has changed over the past several decades to address fraud and abuse. Then evaluate the effectiveness of these efforts and analyze why they have and/or have not been ef..
|
Summary of your approach to reverse engineering
: You are expected to produce the report containing: Summary of your approach to reverse engineering (1-2 pages max) Variables defined in the program: their purpose, content, and structure. Overall algorithm of the program (a flow chart of the main() f..
|
Discuss the importance of technological advancements
: discuss the importance of technological advancements to its success as a mode of storytelling. How might it have been told differently, for better or worse, without these technological advancements?
|
Discuss folletts view of managing conflict
: Discuss Follett's view of managing conflict and provide an example. Discuss strategic alliance and explain the difficulties and opportunities that may occur during an acquisition or merger. Explain the three types of leadership and discuss which type..
|
Data mining in relationship with data warehousing
: Where do you see the future of Data mining in relationship with data warehousing in next ten years.
|
Describe how cnidarians and ctenophores are similar
: Describe how Cnidarians and Ctenophores are similar. How are they different? Sea anemones compete for space and this was covered in lecture. Describe how they ‘wage war'.
|