Reverse Engineering 2: Windows GUI Programs

Reverse Engineering 2: Windows GUI Programs

Reverse engineer Windows Graphical User Interface programs with xdbg

What you’ll learn

  • Disassemble windows programs
  • Reversing jumps
  • Patching
  • Debugging windows programs
  • Solving crackme’s
  • NOP instructions
  • Modifying EAX register values
  • Setting Hardware Breakpoints
  • Memory Patching
  • Intermodular Call Method
  • Call Stack Method
  • Understand how Trial Period works
  • Understand how Software Registration process works
  • Remove Nag Screens

Requirements

  • Preferably have Completed Reverse Engineering 1: x64dbg Debugger for Beginners, or already know how to use x64dbg
  • Windows PC

Who this course is for:

  • Computing students who want to learn how to disassemble and debug windows programs
  • Anyone who is interested in reverse engineering
  • Programmers who want to know how to fix bugs in programs without the source code

Tutorial Bar
Logo