Detect/Fool OllyDgb (Ring3 debugger)

Hello Coders, Our software is usually attacked by crackers using OllyDbg debugger. We know that there are common (and well known) ways to detect OllyDbg in memory, but we want new tricks that can detect and/or fool OllyDbg in memory. If you are creative and with good knowledge in this project, please, do not hesitate to contact us. We'd like the solutions being coded in MASM. Thanks.

## Deliverables

1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done.

2) Deliverables must be in ready-to-run condition, as follows? (depending on the nature? of the deliverables):

a)? For web sites or? other server-side deliverables intended to only ever exist in one place in the Buyer's environment--Deliverables must be installed by the Seller in ready-to-run condition in the Buyer's environment.

b) For all others including desktop software or software the buyer intends to distribute: A software? installation package that will install the software in ready-to-run condition on the platform(s) specified in this bid request.

3) All deliverables will be considered "work made for hire" under U.S. Copyright law. Buyer will receive exclusive and complete copyrights to all work purchased. (No GPL, GNU, 3rd party components, etc. unless all copyright ramifications are explained AND AGREED TO by the buyer on the site per the coder's Seller Legal Agreement).

## Platform

All Windows. MASM32

기술: 조립, C 프로그래밍, 컴퓨터 보안, 공학, MySQL, PHP, 소프트웨어 아키텍처, 소프트웨어 테스팅, 웹 보안

확대 보기: debugger ring3, web programming solutions, web c++ programming debugger, ollydbg, creative programming, ring done, detect php, masm project, fool installation program, install debugger, good knowledge law, web programming tricks, ring work, functional ring, site debugger, ring3, site php attacked, php detect, debugger, source contact solutions

고용주 소개:
( 62건의 리뷰 ) Jerez de la Frontera, Spain

프로젝트 ID: #3807306