4.38 out of 5
4.38
10 reviews on Udemy

Reverse Engineering 2: Windows GUI Programs

Reverse engineer Windows Graphical User Interface programs with xdbg
Instructor:
Paul Chin
11,065 students enrolled
English [Auto]
Disassemble windows programs
Reversing jumps
Patching
Debugging windows programs
Solving crackme's
NOP instructions
Modifying EAX register values
Setting Hardware Breakpoints
Memory Patching
Intermodular Call Method
Call Stack Method
Understand how Trial Period works
Understand how Software Registration process works
Remove Nag Screens

In the first course in this series entitled Reverse Engineering 1: x64dbg Debugger for Beginners, you learnt how to reverse engineer a command line program and learnt how to debug and step over and patch and much more. Now, in this 2nd course, you will continue learning. This time we will be learning how to reverse engineer graphical user interface programs. As usual, we will work with crackme’s that I have written for you to practice reversing.

What you will learn:

  • How to disassemble programs into assembly code

  • Dynamic Analysis

  • Setting breakpoints and stepping through code

  • Modify program behaviour

  • Patching programs

  • Intermodular Call Method

  • Call Stack Method

  • Hardware Breakpoints

  • Memory Patching

  • Patching EAX register values

  • Understanding Trial Period software

  • Understanding Software Registration process

Thank you and see you inside.

Introduction

1
Introduction

Introduction

Introduction to windows gui programs

1
Introduction to windows gui programs

Introduction to windows gui programs

Analyzing PE files

1
Analyzing PE files

Setting up x64dbg

1
Setting up x64dbg

Setting up x64dbg

Setting breakpoints on strings

1
Setting breakpoints on strings

Setting breakpoints on strings

Windows API functions

1
Windows API functions

Windows API functions

Pushing parameters to the stack

1
Pushing parameters to the stack

Pushing parameters to the stack

Bypassing messages

1
Bypassing messages

Bypassing messages

Bypassing using xor assembly

1
Bypassing using xor assembly

Bypassing using xor assembly

Breakpoints on Intermodular Calls

1
Breakpoints on Intermodular Calls

Breakpoints on Intermodular Calls

Breakpoints from Call Stack

1
Breakpoints from Call Stack

Breakpoints from Call Stack

Registration file checks

1
Registration file checks

Registration file checks

Analyzing crackme 2

1
Analyzing crackme 2

Analyzing crackme 2

Registration checks

1
Registration checks

Registration checks

Software registration

1
Software registration

Software registration

Removing Nag screens

1
Removing Nag screens

Removing Nag screens

Analyzing crackme 3

1
Analyzing crackme 3

Analyzing crackme 3

Removing Nag screen 1

1
Removing Nag screen 1

Removing Nag screen 1

Removing Nag screen 2

1
Removing Nag screen 2

Removing Nag screen 2

Setting Registration Status

1
Setting Registration Status

Setting Registration Status

Trial Periods

1
Trial Periods

Trial Periods

Analyzing Trial Periods

1
Analyzing Trial Periods

Analyzing Trial Periods

Extending Trial Periods

1
Extending Trial Periods

Autogenerated serial keys

1
Autogenerated serial keys

Autogenerated serial keys

Autogenerated serial keys 2

1
Autogenerated serial keys 2

Autogenerated serial keys 2

Practical Exercise - TDC

1
Practical Exercise - TDC
2
Practical Exercise - TDC - part 2

Practical Exercise - TDC - part 2

3
Practical Exercise - TDC - part 3

Patching EAX register values

1
Patching EAX register values

Patching EAX register values

2
Patching EAX register values - part 2

Patching EAX register values - part 2

Hardware Breakpoints

1
Hardware Breakpoints

Hardware Breakpoints

2
Hardware Breakpoints - part 2

Hardware Breakpoints - part 2

Memory Patching

1
Memory Patching

Memory Patching

2
Memory Patching - part 2

xAnalyzer

1
xAnalyzer

xAnalyzer

2
Configuring xAnalyzer

Configuring xAnalyzer

Serial Phishing

1
Intro to Serial Phishing

Intro to Serial Phishing

2
Analyzing the CreateFile API function

Analyzing the CreateFile API function

3
Serial Phising

Resources for Further Study

1
Bonus Lecture

Bonus Lecture

You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
4.4
4.4 out of 5
10 Ratings

Detailed Rating

Stars 5
8
Stars 4
1
Stars 3
0
Stars 2
1
Stars 1
0
5477a4b4dfe9ba75dd16a714bc31a8e5
30-Day Money-Back Guarantee

Includes

4 hours on-demand video
Full lifetime access
Access on mobile and TV
Certificate of Completion
Don't Miss Any Course Join Our Telegram Channel Join Channel
+ +