← back
PowerPC Bootloader Reverse Engineering

PowerPC Bootloader Reverse Engineering

Pending
💰 INR 12500–37500 👤 Unknown 🕒 17d ago status: new
Technical Writing Software Testing Software Development Binary Analysis Embedded Systems Technical Documentation Reverse Engineering Visual Design
This project focuses on dissecting a PowerPC-based embedded bootloader in Ghidra so I can fully understand how execution begins and is passed on to the main application firmware. The spotlight is on the initialization sequence: I need a deep-dive that results in a clear, shareable flowchart outlining the exact step-by-step process, full function-call hierarchy, and all relevant register configurations that occur from POR through the jump to the application entry point. Beyond the early init path, I also want your analysis of the flashing routines, overall startup flow, security access checks, checksum or CRC logic, and the final hand-off mechanics. While code commenting and vulnerability hunting are welcome side benefits, the core deliverable is the comprehensive, visually organised flowchart supported by well-structured Ghidra annotations so I can trace any line of code straight back to your diagram. Deliverables • Ghidra project (with renamed functions, tagged register use, and comments) • PDF or Visio-style flowchart of the initialization sequence showing steps, calls, and registers • Brief technical note summarising flashing, security, checksum, and hand-off findings Help modifying firmware to act in a particular way I will supply the binary image and any header files I have; everything else will come from your reverse-engineering expertise. Accuracy, clarity, and reproducibility are critical.
↗ View on Freelancer