IMT-96: Software Hacking
Q1: You are a developer at a reputed Internet Security company, your company is about to launch a product in Internet Safety for home users. Design a custom protection scheme that you prefer to be the best way to track piracy at the same time you have to keep your software customer friendly.
Q2: What are EFLAGS? Give examples. Which EFLAG is of the most use and has priority in assembly analysis of programs in a debugger?
Q3: How is a DWORD data type different from the BYTE data type in assembly programming?
Q4: In context to Virtual Memory Management, out of the 3 states of a process's virtual address, in which state is the page access, protected by memory protection option? And which API call is used to specify memory access permissions?
Q5: Explain the working of SoftlCE. Decompilers are not reliable. Why?
Q6: While crackers are breaking time-based protections, what APIs they mostly look for in the program disassembly? And what are the preferred
Countermeasures for it?
Q7: Among UPX, ASPACK and MoleBox (all in their latest versions), which one would you choose to pack your programs and its dependants (DLLs, OCXs etc.) and why?
Q8. A binary program has 50 45 00 00 in the signature field. Determine whether it's a PE,NE, LE or LX file. Mention reason.
Q9: What are descriptors, in context to Symbian mobile OS? How are they useful in mobile application reversing?
|