Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Udemy

Reverse Engineering 4: Software Protection

via Udemy

Overview

Learn how software protection works from the inside out using the x64dbg debugger

What you'll learn:
  • How to unpack programs
  • Bypass anti-debuggers
  • Patch programs
  • Dump memory to files
  • Use x64dbg debugger
  • Use ScyllaHide plugin
  • 3 ways to unpack layered protections
  • What if the program cannot be unpacked
  • Using loaders for process patching
  • and more....

If you had always wanted to learn how software protection works and how to use x64dbg to unpack them, then this is the course for you. This course is an introduction to Software Protection for anyone who wants to get started in this field. It is suitable for software developers who want to learn how to protect their software and also for reverse engineers who want to fix bugs where the source code is not available.

You will learn how to use x64dbg to unpack Crackmes protected with packing and anti-debugging. A CrackMe is a small program designed to test a programmer's reverse engineering skills.

What you will learn

  • How to set hardware breakpoints and analyze the unpacking header stub

  • Dumping unpacked executable from memory

  • Fixing Import Address Tables (IAT)after dumping memory.

  • Modify program behaviour

  • Patching programs

  • Creating loaders for process patching

  • What if the program cannot be unpacked

  • 3 techniques to unpack multiple protections

Prerequisites:

Before taking this course, you should already be familiar with how to use x64dbg.

Money back guarantee:

This course is backed by a 30-day money back guarantee. So, go ahead and enroll in this course now and start reverse engineering and debugging programs the fun and easy way!

Syllabus

  • Introduction
  • Introduction to Software Protection
  • Downloading CrackMe 11
  • Examining the packer protection
  • Unpacking the packed program
  • Patching the dumped file
  • Introduction to Loaders
  • Creating a Loader
  • Introduction to Anti-Debugging Protection
  • Downloading CrackMe 12
  • Patching Anti-Debugging API calls
  • Installing the Scylla Hide plugin for anti-anti-debugging
  • Using ScyllaHide to hide the debugger
  • Introduction to multiple software protection
  • 3 ways to reverse engineer multiple protections
  • Technique #1: Hiding debugger and using loader for process patching
  • Technique #2: Hiding debugger, unpack then patch
  • Technique #3: Hiding debugger, then do Serial Phising
  • Resources for Further Study

Taught by

Paul Chin

Reviews

4.2 rating at Udemy based on 233 ratings

Start your review of Reverse Engineering 4: Software Protection

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.