Jiandikishe sasa

Ingia

Nenosiri lililopotea

Umepoteza nywila yako? Tafadhali ingiza anwani yako ya barua pepe. Utapokea kiunga na utaunda nywila mpya kupitia barua pepe.

Ongeza chapisho

Lazima uingie ili kuongeza chapisho .

Ongeza swali

Lazima uingie ili kuuliza swali.

Ingia

Jiandikishe sasa

Karibu kwenye Scholarsark.com! Usajili wako utakupa ufikiaji wa kutumia huduma zaidi za jukwaa hili. Unaweza kuuliza maswali, toa michango au toa majibu, angalia maelezo mafupi ya watumiaji wengine na mengi zaidi. Jiandikishe sasa!

Kubadilisha Uhandisi 2: Windows GUI Programs

Kubadilisha Uhandisi 2: Windows GUI Programs

Bei: $19.99

In the first course in this series entitled Kubadilisha Uhandisi 1: x64dbg Debugger for Beginners, you learnt how to reverse engineer a command line program and learnt how to debug and step over and patch and much more. Sasa, in this 2nd course, you will continue learning. This time we will be learning how to reverse engineer graphical user interface programs. As usual, we will work with crackme’s that I have written for you to practice reversing.

Nini utajifunza:

  • How to disassemble programs into assembly code

  • Dynamic Analysis

  • Kuweka njia za mapumziko na kupitia nambari

  • Rekebisha tabia ya programu

  • Kuunganisha mipango

  • Intermodular Call Method

  • Call Stack Method

  • Hardware Breakpoints

  • Memory Patching

  • Patching EAX register values

  • Kuelewa programu ya Kipindi cha Kesi

  • Kuelewa mchakato wa Usajili wa Programu

Thank you and see you inside.

Kuhusu arkadmin

Acha jibu