Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Udemy

Reverse Engineering 2: Windows GUI Programs

via Udemy

Overview

Reverse engineer Windows Graphical User Interface programs with xdbg

What you'll learn:
  • Disassemble windows programs
  • Reversing jumps
  • Patching
  • Debugging windows programs
  • Solving crackme's
  • NOP instructions
  • Modifying EAX register values
  • Setting Hardware Breakpoints
  • Memory Patching
  • Intermodular Call Method
  • Call Stack Method
  • Understand how Trial Period works
  • Understand how Software Registration process works
  • Remove Nag Screens

In the first course in this series entitled Reverse Engineering 1: x64dbg Debugger for Beginners, you learnt how to reverse engineer a command line program and learnt how to debug and step over and patch and much more. Now, in this 2nd course, you will continue learning. This time we will be learning how to reverse engineer graphical user interface programs. As usual, we will work with crackme's that Ihave written for you to practice reversing.

What you will learn:

  • How to disassemble programs into assembly code

  • Dynamic Analysis

  • Setting breakpoints and stepping through code

  • Modify program behaviour

  • Patching programs

  • Intermodular Call Method

  • Call Stack Method

  • Hardware Breakpoints

  • Memory Patching

  • Patching EAX register values

  • Understanding Trial Period software

  • Understanding Software Registration process

Thank you and see you inside.

Syllabus

  • Introduction
  • Introduction to windows gui programs
  • Analyzing PE files
  • Setting up x64dbg
  • Setting breakpoints on strings
  • Windows API functions
  • Pushing parameters to the stack
  • Bypassing messages
  • Bypassing using xor assembly
  • Breakpoints on Intermodular Calls
  • Breakpoints from Call Stack
  • Registration file checks
  • Analyzing crackme 2
  • Registration checks
  • Software registration
  • Removing Nag screens
  • Analyzing crackme 3
  • Removing Nag screen 1
  • Removing Nag screen 2
  • Setting Registration Status
  • Trial Periods
  • Analyzing Trial Periods
  • Extending Trial Periods
  • Autogenerated serial keys
  • Autogenerated serial keys 2
  • Practical Exercise - TDC
  • Patching EAX register values
  • Hardware Breakpoints
  • Memory Patching
  • xAnalyzer
  • Serial Phishing
  • Resources for Further Study

Taught by

Paul Chin, PhD

Reviews

4.6 rating at Udemy based on 294 ratings

Start your review of Reverse Engineering 2: Windows GUI Programs

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.