Reverse Engineering 4: Software Protection
Posted on 11 Mar 06:36 | by LeeAndro | 12 views
Paul Chin | Duration: 2:14 h | Video: H264 1280x720 | Audio: AAC 44,1 kHz 2ch | 1,32 GB | Language: English
Learn how software protection works from the inside out using the x64dbg debugger
If you had always wanted to learn how software protection works and how to use x64dbg to unpack them, then this is the course for you. This course is an introduction to Software Protection for anyone who wants to get started in this field. It is suitable for software developers who want to learn how to protect their software and also for reverse eeers who want to fix bugs where the source code is not available.
You will learn how to use x64dbg to unpack Crackmes protected with packing and anti-debugging. A CrackMe is a small program designed to test a programmer's reverse eeering skills.
What you will learn
How to set hardware breakpoints and analyze the unpacking header stub
Dumping unpacked executable from memory
Fixing Import Address Tables (IAT) after dumping memory.
Modify program behaviour
Patching programs
Creating loaders for process patching
What if the program cannot be unpacked
3 techniques to unpack multiple protections
HomePage:
https://www.udemy.com/course/reversing-software-protection/
DOWNLOAD
1dl
uploadgig
https://uploadgig.com/file/download/8f1e0277fd3c661a/g9ISxPti_.part1.rar
https://uploadgig.com/file/download/B685239CA43abbBa/g9ISxPti_.part2.rar
rapidgator
https://rapidgator.net/file/9bdb00604c882f75863a4150b0f9b101/g9ISxPti_.part1.rar.html
https://rapidgator.net/file/4c34aa1f48881e557a40e3705bcdcaa5/g9ISxPti_.part2.rar.html
Related News
System Comment
Information
Users of Visitor are not allowed to comment this publication.
Facebook Comment
Member Area
Top News