Reverse Engineering Minesweeper: Reconstruct Minesweeper Source Code
This project is currently on-going. The purpose of this is to reconstruct the full source code of the original windows xp Minesweeper. (sha256: bcff89311d792f6428468e813ac6929a346a979f907071c302f418d128eaaf41)
I finished reconstructing the full minesweeper source:) The only thing that I don't have time to do is to order variables in one module.. Looking in the assembly code and variable layout it looks like most of the variables were global variables declared in one source file.
The artifacts of the reverse engineering process:
Most of the process is done using static analysis without using a decompiler. I wanted to read lots of assembly code.
As stated here, The source code of Minesweeper has already been leaked - So we have a peek at the original source back then.
After I finished the project, I compared the source code from my reversing to the leaked source, you can see it's almost identical, so yay.
The purpose of this tool is to allow full control over a remote minesweeper process. Some ideas I had: