We want a command line program, entitled "inject_exe_into_system_ram_dump.exe".
If "inject_exe_into_system_ram_dump.exe" is executed, it will introduce a .exe (e.g. "security_update.exe") into a saved system RAM dump.
The saved system RAM dump is an exact image of the computers RAM memory, either "C:hiberfil.sys", or a RAM image created by VMware Workstation. If you do not know what VMware Workstation is, it is a method of running a virtual PC in a window - see www.vmware.com.
The reason for this? We have a number of saved VMware Workstation images. We want to introduce system patches across our organization, one at a time, without having to execute the saved RAM image under VMWare.
In summary, our goal is this: run an arbitrary .exe file on a Windows 2000/XP/Vista machine, by altering a file containing a system RAM dump, while the machine is paused or switched off.
It will require a good understanding of how Windows works internally to start/stop threads and processes, and a good knowledge of x86 assembly. We are aware of the reasonably large complexity of this problem. How exactly this is step is performed is left to the wisdom of the contractor.
There is a lot more to this job than I have written here. We would require some discussion to verify the contractors credentials before commencing work on this job.
Hello, Ralph. 1. I'm really interested in your project. 2. I think I have the necessary knowledge to fulfill the project, in particular: I have an experience in reverse engineering of x86 windows applications, work Daha Fazla
14 freelancers are bidding on average $4021 for this job
Experience of programming on C and Assembler 20+ years. Good knowledge of architecture x86.
Dear Sir , We have all necessary skills in this area. We use most advanced technologies and offer qualified technical assistance. Quality and satisfaction are guaranteed. If there are any questions, we have suppor Daha Fazla
Hi! This sounds like a fun project. And just so you know I can do it (well, there are a ton of ways, here's a simple one): I'll probably scan for a few instructions in the .code section of a system process (in the memo Daha Fazla
Hello, I have red your documentation, and we have over 12 years of C++. We can handle this reverse engineering project, no problem. We are a highly professional and motivated team with good reputation and plenty pre Daha Fazla
Hi; We have cross platform driver development expertise. We work extensively with VMWARE for our driver and application testing. Thanks, YBS
We are system programming gurus. If interested, please contact Us for farther discussion. Thank You
That's an interesting hack. Hope to have a nice time working on that stuff. I'm a driver Dev (reversing and cracking is mine).
good day, I'm really interested in this project. I'm experienced assemly language developer and a reverse engineer. Please contact me and we will discuss the details
Hi, We are experienced windows driver programmers; to throw some light on this front, we have worked on file system filter drivers for XP/2K/2K3 server…OS and have nice experience of writing platform independent co Daha Fazla