Reverse Engineering 2: Windows GUI Programs
Learn how to disassemble programs into assembly code and more advanced topics in Reverse Engineering 2
IT and Software ,Operating Systems and Servers,Operating Systems
Lectures -41
Resources -22
Duration -4 hours
Lifetime Access
Lifetime Access
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
In the first course in this series entitled Reverse Engineering 1: x64dbg Debugger for Beginners, you learnt how to reverse engineer a command line program and learnt how to debug and step over and patch and much more. Now, in this 2nd course, you will continue learning. This time we will be learning how to reverse engineer graphical user interface programs. As usual, we will work with crack me's that I have written for you to practice reversing.
You'll learn in this course:
- How to disassemble programs into assembly code.
- Dynamic Analysis.
- Setting breakpoints and stepping through code.
- Modify program behaviour.
- Patching programs.
- Intermodular Call Method.
- Call Stack Method.
- Hardware Breakpoints.
- Memory Patching.
- Patching EAX register values.
- Understanding Trial Period software.
- Understanding the Software Registration Process.
Goals
- Disassemble Windows programs.
- Reversing jumps.
- Patching.
- Debugging Windows programs.
- Solving Crackme's.
- NOP instructions.
- Modifying EAX register values.
- Setting Hardware Breakpoints.
- Memory Patching.
- Intermodular Call Method.
- Call Stack Method.
- Understand how the Trial Period works.
- Understand how the Software Registration process works.
- Remove Nag Screens.
Prerequisites
- Windows PC.
- Some Assembly or C background would help, but not mandatory.

Curriculum
Check out the detailed breakdown of what’s inside the course
Introduction
1 Lectures
-
Intro to Reverse Engineering Windows GUI Programs 03:20 03:20
Introduction to windows gui programs
1 Lectures

Analyzing PE files
1 Lectures

Setting Up x64dbg
1 Lectures

Setting Breakpoints On Strings
1 Lectures

Windows API Functions
1 Lectures

Pushing Parameters To The Stack
1 Lectures

Bypassing Messages
1 Lectures

Bypassing By Using XOR Assembly Instructions
1 Lectures

Setting Breakpoints On Intermodular Calls
1 Lectures

Setting Breakpoints From The Call Stack
1 Lectures

Registration File Checks
1 Lectures

Analyzing Crackme 2
1 Lectures

Registration Checks
1 Lectures

Software Registration
1 Lectures

Removing Nag Screens
1 Lectures

Analyzing Crackme 3
1 Lectures

Removing Nag Screen 1
1 Lectures

Removing Nag Screen 2
1 Lectures

Setting Registration Status
1 Lectures

Intro To Trial Period Software
1 Lectures

Analyzing Trial Periods
1 Lectures

Extending Trial Periods
1 Lectures

Auto-Generated Serial Keys
1 Lectures

Auto-Generated Serial Keys 2
1 Lectures

Practical Exercise: TDC crackme
3 Lectures

Patching EAX Register Values
2 Lectures

Hardware Breakpoints
2 Lectures

Memory Patching
2 Lectures

XAnalyzer
2 Lectures

Serial Phising
3 Lectures

Resources For Further Study
1 Lectures

Instructor Details

Cracking Lessons
Course Certificate
Use your certificate to make a career change or to advance in your current career.

Our students work
with the Best


































Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe now
Online Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now