Reverse engineer data structures in unmanaged Windows app

Reverse engineer data structures in unmanaged Windows app

Closed - This job posting has been filled and work has been completed.

Job Description

I'm writing a radar program for a game. Unfortunately I'm bad at reverse engineering. I need help from somebody who can locate data in the game's client about NPCs, mobs, and players in the game.

More specifically, you will probably use tools like OllyDbg and IdaPro to locate buffers or functions inside the game's client process that can be read or called to extract this information. You don't have to write any code. You'll just explain to me where the decrypted data is stored inside the client and give me the info I need to write and maintain the radar program.

Details:

The game client is an unmanaged Windows program. The data is sent to the client in encrypted packets from the server and decrypted by the client.

Your work product will consist of (1) delivering to me instructions for reading the decrypted data from the client's process that I can implement as part of a radar program and (2) explaining to me how you found the data so I can do it in the future myself.

More details (added May 27):

1. Contractor will find a way for my code to read decrypted UDP and TCP packets in the game process.

2. Contractor will explain to me how to hook particular functions in the game's process that my code can use to read all decrypted UDP and TCP packets.

3. Contractor will deliver OllyDbg files with notes about the game process (or equivalent if another tool is used).

4. Contractor will deliver source code of test program for hooking functions.

5. Contractor will answer a reasonable number of questions if I have trouble understanding the delivered files.

6. Contractor will receive $50 in advance before work starts.

7. Contractor will receive an additional $50 after the work is finished and delivery is complete.