You have chosen to sponsor your bid up to a maximum amount of .
I am having a research to find vulnerabilities in XBox360 security method during handshake with Gamepad.
The project is progressing well until it met a blocker. XBox360 use hash challenge request to authenticate only genuine gamepad is used.
I have dump data of genuine XBOX gamepad, both the challenge request and the answer.
I would like you to figure out the algorithm used for calculating challenge request and if necessary, brute forcing the symmetrical key used during hashing process.
Please let me know if you are capable of doing this task. Provide me with your experience, proposed budget and time.