Reverse Engineering 2: Windows GUI Programs
Learn How To Reverse Engineer Windows Programs
Course Description
In the first course in this series entitled Reverse Engineering 1: x64dbg Debugger for Beginners, you learnt how to reverse engineer a command line program and learnt how to debug and step over and patch and much more. Now, in this 2nd course, you will continue learning. This time we will be learning how to reverse engineer graphical user interface programs. As usual, we will work with crackme's that I have written for you to practice reversing.
What you will learn:
- How to disassemble programs into assembly code
- Dynamic Analysis
- Setting breakpoints and stepping through code
- Modify program behaviour
- Patching programs
- Intermodular Call Method
- Call Stack Method
- Hardware Breakpoints
- Memory Patching
- Patching EAX register values
- Understanding Trial Period software
- Understanding Software Registration process
Thank you and see you inside.
Goals
What will you learn in this course:
- Disassemble windows programs
- Reversing jumps
- Patching
- Debugging windows programs
- Solving Crackme's
- NOP instructions
- Modifying EAX register values
- Setting Hardware Breakpoints
- Memory Patching
- Intermodular Call Method
- Call Stack Method
- Understand how Trial Period works
- Understand how Software Registration process works
- Remove Nag Screens
Prerequisites
What are the prerequisites for this course?
- Windows PC
- Some Assembly or C background would help, but not mandatory

Curriculum
Check out the detailed breakdown of what’s inside the course
Introduction
1 Lectures
-
Intro to Reverse Engineering Windows GUI Programs 03:20 03:20
Introduction to windows gui programs
1 Lectures

Analyzing PE files
1 Lectures

Setting Up x64dbg
1 Lectures

Setting Breakpoints On Strings
1 Lectures

Windows API Functions
1 Lectures

Pushing Parameters To The Stack
1 Lectures

Bypassing Messages
1 Lectures

Bypassing By Using XOR Assembly Instructions
1 Lectures

Setting Breakpoints On Intermodular Calls
1 Lectures

Setting Breakpoints From The Call Stack
1 Lectures

Registration File Checks
1 Lectures

Analyzing Crackme 2
1 Lectures

Registration Checks
1 Lectures

Software Registration
1 Lectures

Removing Nag Screens
1 Lectures

Analyzing Crackme 3
1 Lectures

Removing Nag Screen 1
1 Lectures

Removing Nag Screen 2
1 Lectures

Setting Registration Status
1 Lectures

Intro To Trial Period Software
1 Lectures

Analyzing Trial Periods
1 Lectures

Extending Trial Periods
1 Lectures

Auto-Generated Serial Keys
1 Lectures

Auto-Generated Serial Keys 2
1 Lectures

Practical Exercise: TDC crackme
3 Lectures

Patching EAX Register Values
2 Lectures

Hardware Breakpoints
2 Lectures

Memory Patching
2 Lectures

XAnalyzer
2 Lectures

Serial Phising
3 Lectures

Resources For Further Study
1 Lectures

Instructor Details

Cracking Lessons
More than 20 years experience in teaching computer science and information technology. Programmer, ethical hacker and reverse engineer. Enjoys solving reverse engineering challenges.
Course Certificate
User your certification to make a career change or to advance in your current career. Salaries are among the highest in the world.

Our students work
with the Best


































Feedbacks
Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe now
Online Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now