Register Now

Login

Lost Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Add post

You must login to add post .

Login

Register Now

Welcome to Scholarsark.com! Your registration will grant you access to using more features of this platform. You can ask questions, make contributions or provide answers, view profiles of other users and lots more. Register now!

Reverse Engineering 2: Windows GUI Programs

Reverse Engineering 2: Windows GUI Programs

item image
 Buy Now
Facebook Twitter Pinterest

Price: $19.99

In the first course in this series entitled Reverse Engineering 1: x64dbg Debugger for Beginners, you learnt how to reverse engineer a command line program and learnt how to debug and step over and patch and much more. Now, in this 2nd course, you will continue learning. This time we will be learning how to reverse engineer graphical user interface programs. As usual, we will work with crackme’s that I have written for you to practice reversing.

What you will learn:

  • How to disassemble programs into assembly code

  • Dynamic Analysis

  • Setting breakpoints and stepping through code

  • Modify program behaviour

  • Patching programs

  • Intermodular Call Method

  • Call Stack Method

  • Hardware Breakpoints

  • Memory Patching

  • Patching EAX register values

  • Understanding Trial Period software

  • Understanding Software Registration process

Thank you and see you inside.

About arkadmin

Leave a reply

Brilliantly Safe & Student-Centered Learning Platform 2021