Reverse Engineering 2: Windows GUI Programs
Learn How To Reverse Engineer Windows Programs
IT & Software,Reverse Engineering
Lectures -41
Resources -22
Duration -4 hours
30-days Money-Back Guarantee
Get your team access to 10000+ top Tutorials Point courses anytime, anywhere.
Course Description
In the first course in this series entitled Reverse Engineering 1: x64dbg Debugger for Beginners, you learnt how to reverse engineer a command line program and learnt how to debug and step over and patch and much more. Now, in this 2nd course, you will continue learning. This time we will be learning how to reverse engineer graphical user interface programs. As usual, we will work with crackme's that I have written for you to practice reversing.
What you will learn:
- How to disassemble programs into assembly code
- Dynamic Analysis
- Setting breakpoints and stepping through code
- Modify program behaviour
- Patching programs
- Intermodular Call Method
- Call Stack Method
- Hardware Breakpoints
- Memory Patching
- Patching EAX register values
- Understanding Trial Period software
- Understanding Software Registration process
Thank you and see you inside.
Goals
What will you learn in this course:
- Disassemble windows programs
- Reversing jumps
- Patching
- Debugging windows programs
- Solving Crackme's
- NOP instructions
- Modifying EAX register values
- Setting Hardware Breakpoints
- Memory Patching
- Intermodular Call Method
- Call Stack Method
- Understand how Trial Period works
- Understand how Software Registration process works
- Remove Nag Screens
Prerequisites
What are the prerequisites for this course?
- Windows PC
- Some Assembly or C background would help, but not mandatory
Curriculum
Check out the detailed breakdown of what’s inside the course
Introduction
1 Lectures
- Intro to Reverse Engineering Windows GUI Programs 03:20 03:20
Introduction to windows gui programs
1 Lectures
Analyzing PE files
1 Lectures
Setting Up x64dbg
1 Lectures
Setting Breakpoints On Strings
1 Lectures
Windows API Functions
1 Lectures
Pushing Parameters To The Stack
1 Lectures
Bypassing Messages
1 Lectures
Bypassing By Using XOR Assembly Instructions
1 Lectures
Setting Breakpoints On Intermodular Calls
1 Lectures
Setting Breakpoints From The Call Stack
1 Lectures
Registration File Checks
1 Lectures
Analyzing Crackme 2
1 Lectures
Registration Checks
1 Lectures
Software Registration
1 Lectures
Removing Nag Screens
1 Lectures
Analyzing Crackme 3
1 Lectures
Removing Nag Screen 1
1 Lectures
Removing Nag Screen 2
1 Lectures
Setting Registration Status
1 Lectures
Intro To Trial Period Software
1 Lectures
Analyzing Trial Periods
1 Lectures
Extending Trial Periods
1 Lectures
Auto-Generated Serial Keys
1 Lectures
Auto-Generated Serial Keys 2
1 Lectures
Practical Exercise: TDC crackme
3 Lectures
Patching EAX Register Values
2 Lectures
Hardware Breakpoints
2 Lectures
Memory Patching
2 Lectures
XAnalyzer
2 Lectures
Serial Phising
3 Lectures
Resources For Further Study
1 Lectures
Instructor Details
Cracking Lessons
More than 20 years experience in teaching computer science and information technology. Programmer, ethical hacker and reverse engineer. Enjoys solving reverse engineering challenges.
Course Certificate
Use your certificate to make a career change or to advance in your current career.
Our students work
with the Best
Related Video Courses
View MoreAnnual Membership
Become a valued member of Tutorials Point and enjoy unlimited access to our vast library of top-rated Video Courses
Subscribe nowOnline Certifications
Master prominent technologies at full length and become a valued certified professional.
Explore Now