Reverse engineer and document Win32 C++ function. - Upwork

Looking for an experienced C++ Reverse Engineer..

Someone who can recognize C++ constructs by their shape in the IDA graph.  Someone for whom binary editing, dll injection and getting around anti-debugger techniques like self-allocation is just another day at the office.

No compression or obfuscation.

The function is in a Borland C++ Windows 32 bit app and serializes objects with keypair text output.  The goal is to understand how this function works with the intent to leverage it for our own purposes.

The location is known, breakpoints were set in IDA. We are just at the limit of our understanding of just the tooling so wish to leverage an expert.

The successful candidate will use both static and dynamic analysis to grok how this function is constructed and used within the application.

Documentation, advice and work output such as IDA databases will be supplied.

This is just the first step in a larger project; looking to build a relationship.

Budget: $100
Posted On: September 06, 2022 22:33 UTC
Category: Desktop Software Development
Skills:Reverse Engineering, C++, Software Debugging, X86 Assembly Language, Windows App Development
Country: United States
click to apply

from All jobs | upwork.com https://ift.tt/VrH5TYt

No comments:

Post a Comment

Have any Issues? Please guide me.