Software reverse engineering
Software reverse engineering
// Files .txt
Software reverse
engineering
*
Additional study
material
// Prologue
Introduction
You are a knight of the Kingdom of Transformation.
Initial software
logic
Restored software
logic
This is the main purpose
of all test tasks.
Initial software
logic Software engineering
Restored software
logic Reverse engineering
This is the main purpose
of all test tasks.
PROGRAM CODE //
Initial software PROGRAM
Executable
logic Python code
machine or byte
Java code + Initial data of
code
C-code
test tasks
A secret key is required!
TEST TASK
logic
TEST TASK
pseudo-code
PYTHON CODE
Invalid key *
Exe-wrapper The program’s text code It’s a pity! You were
runs in the
environment
OS :
understandable to the KILLED by a
programmer (with an
> Test_1.exe poisoned arrow!
encrypted secret key)
Unpacking the
Exe-wrapper using 1 Obtaining the code
using the utility 2 Manual code
analysis and 3
the script “uncompyle6" (from search for the
“pyinstxtractor.py”. Test_1.*) secret key
* Details are in
EXE- WRAPPER readme_Task_1.txt
There is a key!
BYTE CODE BYTE CODE It remains to check
PYTHON CODE PYTHON CODE PYTHON CODE that the key fits.
Read more:
Software reverse engineering readme_Task_1.txt
binary
// Performing tasks
Invalid code
* It runs It’s a pity! You were
through virtual CRUSHED by a huge
machine Java:
> java Test_2
boulder!
Read more:
Software reverse engineering readme_Task_2.txt
// Performing tasks
1 2 3
Analyzing assembly code Manual analysis of the
Obtaining text assembly
by navigating through its code functioning
code using the “IDA Pro”
functions, examining block logic and search for
product (code -
diagrams, interpreting CPU the secret key in it.
”IDAView” window,
instructions, and
Spacebar - switch modes,
reconstructing the logic of
Mouse/Click + Arrow
the source code operation.
keys/Enter to navigate
through the code) *There is protection against
decompilation!
Hooray, the last
ASSEMBLY CODE
EXE- CODE
(text)
C-CODE's key! It remains
C-CODE
C-CODE logic
to check that
the key fits.
Read more:
Software reverse engineering readme_Task_3.txt
// Epilogue
Happy ending
Congratulations, all doors are open
to you!
The princess is saved, you are happy and the
kingdom is celebrating the arrival of a new
prince.