• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

IT & Software Reverse Engineering 4 – Software Protection (1 Viewer)

Currently reading:
 IT & Software Reverse Engineering 4 – Software Protection (1 Viewer)

Covers web development, programming, AI, cloud computing, DevOps, and cybersecurity.
Recently searched:

baladia

Member
Amateur
LV
5
Joined
Feb 22, 2024
Threads
1,667
Likes
171
Awards
10
Credits
1,697©
Cash
0$

714eaceb6e99b3e2507fbc657722b193.jpeg




Paul Chin | Duration: 2:14 h | Video: H264 1280x720 | Audio: AAC 44,1 kHz 2ch | 1,37 GB | Language: English
Learn how software protection works from the inside out using the x64dbg debugger
If you had always wanted to learn how software protection works and how to use x64dbg to unpack them, then this is the course for you. This course is an introduction to Software Protection for anyone who wants to get started in this field. It is suitable for software developers who want to learn how to protect their software and also for reverse engineers who want to fix bugs where the source code is not available.
You will learn how to use x64dbg to unpack Crackmes protected with packing and anti-debugging. A CrackMe is a small program designed to test a programmer's reverse engineering skills.


What you will learn:​


• How to set hardware breakpoints and analyze the unpacking header stub
• Dumping unpacked executable from memory
• Fixing Import Address Tables (IAT) after dumping memory.
• Modify program behaviour
• Patching programs
• Creating loaders for process patching
• What if the program cannot be unpacked
• 3 techniques to unpack multiple protections
Homepage:







Link:
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Recently searched:

Similar threads

Users who are viewing this thread

Top Bottom