[100% off] Reverse Engineering 2: Windows GUI Programs
5 Dec , 2020
In the first course in this series entitled Reverse Engineering 1:x64dbg Debugger for Beginners, you learnt how to reverse engineer a command line program and learnt how to debug and step over and patch and much more. Now, in this 2nd course, you will continue learning. This time we will be learning how to reverse engineer graphical user interface programs. As usual, we will work with crackme’s that I have written for you to practice reversing.
What you will learn:
How to disassemble programs into assembly code
Setting breakpoints and stepping through code
Modify program behaviour
Intermodular Call Method
Call Stack Method
Patching EAX register values
Understanding Trial Period software
Understanding Software Registration process
Thank you and see you inside.
Who this course is for:
Computing students who want to learn how to disassemble and debug windows programs
Anyone who is interested in reverse engineering
Programmers who want to know how to fix bugs in programs without the source code
Preferably have Completed Reverse Engineering 1: x64dbg Debugger for Beginners, or already know how to use x64dbg
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.