Tutorialspoint
Subscription Includes
$ 19   8.99

Reverse Engineering 2: Windows GUI Programs

Created by Cracking Lessons, Last Updated 04-Feb-2021, Language:English

Reverse Engineering 2: Windows GUI Programs

Learn How To Reverse Engineer Windows Programs

Created by Cracking Lessons, Last Updated 04-Feb-2021, Language:English

What Will I Get ?

  • Disassemble windows programs
  • Reversing jumps
  • Patching
  • Debugging windows programs
  • Solving Crackme's
  • NOP instructions
  • Modifying EAX register values
  • Setting Hardware Breakpoints
  • Memory Patching
  • Intermodular Call Method
  • Call Stack Method
  • Understand how Trial Period works
  • Understand how Software Registration process works
  • Remove Nag Screens

Requirements

  • Windows PC
  • Some Assembly or C background would help, but not mandatory

Description

In the first course in this series entitled Reverse Engineering 1: x64dbg Debugger for Beginners,  you learnt how to reverse engineer a command line program and learnt how to debug and step over and patch and much more. Now, in this 2nd course, you will continue learning. This time we will be learning how to reverse engineer graphical user interface programs. As usual, we will work with crackme's that I have written for you to practice reversing.

What you will learn:

  • How to disassemble programs into assembly code
  • Dynamic Analysis
  • Setting breakpoints and stepping through code
  • Modify program behaviour
  • Patching programs
  • Intermodular Call Method
  • Call Stack Method
  • Hardware Breakpoints
  • Memory Patching
  • Patching EAX register values
  • Understanding Trial Period software
  • Understanding Software Registration process

Thank you and see you inside.

Course Content

Cracking Lessons

More than 20 years experience in teaching computer science and information technology.  Programmer, ethical hacker and reverse engineer. Enjoys solving reverse engineering challenges.