注册 登录
编程论坛 求职招聘

求职,苹果安卓Android/iOS逆向工程师兼职,10年开发经验

icqmsn 发布于 2021-09-07 16:11, 1305 次点击
本人精通汇编语言、Java、C/C++、Objective-C、Swift,熟悉反编译、脱壳、抓包、拦截、算法破解等,对逆向工程有浓厚兴趣,熟练使用 Linux、Git,有10年以上实际开发经验,暂时只能远程工作,请联系QQ号:4141717(长期在线)
3 回复
#2
diycai2021-09-14 15:59
00007FBF099AF1E9                 mov     rcx, rdx                  
00007FBF099AF1EC                 mov     rax, rdi                  
00007FBF099AF1EF                 xor     edx, edx                  
00007FBF099AF1F1                 div     rcx                        
00007FBF099AF1F4                 xor     eax, eax                  
00007FBF099AF1F6                 test    rsi, rsi                  
00007FBF099AF1F9                 jz      short locret_7FBF099AF22D  
00007FBF099AF1FB                 test    sil, 1                     
00007FBF099AF1FF                 jz      short loc_7FBF099AF214     
00007FBF099AF201                 add     rax, rdx                  
00007FBF099AF204                 mov     rdi, rax                  
00007FBF099AF207                 jb      short loc_7FBF099AF20E     
00007FBF099AF209                 cmp     rcx, rax                  
00007FBF099AF20C                 ja      short loc_7FBF099AF214     
00007FBF099AF20E                 mov     rax, rdi                  
00007FBF099AF211                 sub     rax, rcx                  
00007FBF099AF214                 lea     r8, [rdx+rdx]              
00007FBF099AF218                 cmp     r8, rdx                    
00007FBF099AF21B                 jb      short loc_7FBF099AF222     
00007FBF099AF21D                 cmp     r8, rcx                    
00007FBF099AF220                 jb      short loc_7FBF099AF225     
00007FBF099AF222                 sub     r8, rcx                    
00007FBF099AF225                 shr     rsi, 1                     
00007FBF099AF228                 mov     rdx, r8                    
00007FBF099AF22B                 jmp     short loc_7FBF099AF1F6     
00007FBF099AF22D                 retn                              
00007FBF099AF22E                 push    rbx                        
00007FBF099AF22F                 mov     r10, rsi                  
00007FBF099AF232                 mov     rbx, rdx                  
00007FBF099AF235                 mov     r11d, 1                    
00007FBF099AF23B                 push    rcx                        
00007FBF099AF23C                 test    r10, r10                  
00007FBF099AF23F                 jz      short loc_7FBF099AF270     
00007FBF099AF241                 test    r10b, 1                    
00007FBF099AF245                 jz      short loc_7FBF099AF25D     
00007FBF099AF247                 mov     rsi, r11                  
00007FBF099AF24A                 mov     rdx, rbx                  
00007FBF099AF24D                 mov     [rsp+10h+var_10], rdi      
00007FBF099AF251                 call    start                     
00007FBF099AF256                 mov     rdi, [rsp+10h+var_10]      
00007FBF099AF25A                 mov     r11, rax                  
00007FBF099AF25D                 mov     rsi, rdi                  
00007FBF099AF260                 mov     rdx, rbx                  
00007FBF099AF263                 call    start                     
00007FBF099AF268                 mov     rdi, rax                  
00007FBF099AF26B                 shr     r10, 1                     
00007FBF099AF26E                 jmp     short loc_7FBF099AF23C     
00007FBF099AF270                 mov     rax, r11                  
00007FBF099AF273                 pop     rdx                        
00007FBF099AF274                 pop     rbx                        
00007FBF099AF275                 retn         
                     
来逆向一下,经验丰富的应该经常遇到上面的代码。
#3
自由而无用2021-09-19 15:05
null

[此贴子已经被作者于2021-11-4 18:10编辑过]

#4
diycai2021-09-25 08:10
回复 3楼 自由而无用
厉害。
这是一个常用网络传输加密算法的一部分,我是想测试一下楼主的真实能力。
1