what I need is an analysis of an algorithm which takes an input (exact input format is unknown, only what it should contain is known) and encrypts it to a 48 byte output buffer. The length of this buffer is static.
-Code is in a dll which cannot be run in actual application for live debugging due to the age of said dll.
-Newer versions of DLL are protected by Themida, hence the old version.
I know and have reversed quite a lot about this algorith, and have it all documented in my IDA database. In case you accept this job, you will recieve my IDA DB and a writeup of what I know about the algorithm.
What I know :
-There are at least two static keys, which I both found.
-The algorithm uses twofish for most of it's implementation. Twofish doesn't seem to be modified.
-There is could dynamic in the algorithm. Same input doesn't always generate same output (output = packet contents before actual packet encryption). This may be because of twofish though.
All in all, I think I am pretty close to the solution, but I have problems piecing it together to a final picture. My IDA DB contains all my progress.
The only way for me to test your solution is executing it in a live connection to server, and seeing if server accepts the packet.
Đã trao cho:
7 freelancer đang chào giá trung bình $197 cho công việc này
I'm fairly confident I could help you reverse engineer your DLL, but would need to see it to be sure. Bid and timeframe are just placeholders until then, but they shouldn't drastically change.
Hi, we've experienced a couple of jobs similar to this. We've successfully reversed AES algorithm. We would like to offer our services in this job. It'll be good if we can discuss some details on the task. Regards,
Hi, i am very interesting in this task. I have many experiences like this. I can extract code(c++/vb/delphi) from your binary. Let's start with me. Thanks.