Reverse Engineering 2: Windows GUI Programs
Offered By: Udemy
Course Description
Overview
What you'll learn:
- Disassemble windows programs
- Reversing jumps
- Patching
- Debugging windows programs
- Solving crackme's
- NOP instructions
- Modifying EAX register values
- Setting Hardware Breakpoints
- Memory Patching
- Intermodular Call Method
- Call Stack Method
- Understand how Trial Period works
- Understand how Software Registration process works
- Remove Nag Screens
In the first course in this series entitled Reverse Engineering 1: x64dbg Debugger for Beginners, you learnt how to reverse engineer a command line program and learnt how to debug and step over and patch and much more. Now, in this 2nd course, you will continue learning. This time we will be learning how to reverse engineer graphical user interface programs. As usual, we will work with crackme's that Ihave written for you to practice reversing.
What you will learn:
How to disassemble programs into assembly code
Dynamic Analysis
Setting breakpoints and stepping through code
Modify program behaviour
Patching programs
Intermodular Call Method
Call Stack Method
Hardware Breakpoints
Memory Patching
Patching EAX register values
Understanding Trial Period software
Understanding Software Registration process
Thank you and see you inside.
Taught by
Paul Chin
Related Courses
Dal Reverse engineering alla stampa 3DUniversity of Naples Federico II via Federica Rapid Manufacturing
Indian Institute of Technology Kanpur via Swayam Generative Design for Industrial Applications
Autodesk via Coursera Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX Functional And Conceptual Design
Indian Institute of Technology Madras via Swayam