Jump to content
Tuts 4 You

Paul Chin Reverse Engineering 4: Software Protection


Recommended Posts

The course is free until end of July 4, 2024.
https://www.udemy.com/course/reversing-software-protection/?couponCode=JULY2_FREE

Quote

Reverse Engineering 4: Software Protection


If you had always wanted to learn how software protection works and how to use x64dbg to unpack them,  then this is the course for you. This course is an introduction to Software Protection for anyone who wants to get started in this field. It is suitable for software developers who want to learn how to protect their software and also for reverse engineers who want to fix bugs where the source code is not available.

You will learn how to use x64dbg to unpack Crackmes protected with packing and anti-debugging.  A CrackMe is a small program designed to test a programmer's reverse engineering skills.

What you will learn:

  • How to set hardware breakpoints and analyze the unpacking header stub
  • Dumping unpacked executable from memory
  • Fixing Import Address Tables (IAT) after dumping memory.
  • Modify program behaviour
  • Patching programs
  • Creating loaders for process patching
  • What if the program cannot be unpacked
  • 3 techniques to unpack multiple protections

Prerequisites:

Before taking this course, you should already be familiar with how to use x64dbg.

 

Personally, I think Paul Chin courses are total crap, but apparently some people still want to watch them. So...

  • Thanks 1
Link to comment
Share on other sites

Mahmoudnia

I remember, several years ago, this person was selling Lena's tutorials under his own name.

  • Like 1
  • Haha 1
Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...