Reverse Engineering 2: Windows GUI Programs

Reverse engineer Windows Graphical User Interface programs with xdbg

4.68 (137 reviews)
Udemy
platform
English
language
Network & Security
category
instructor
19,957
students
4 hours
content
Nov 2021
last update
$19.99
regular price

What you will learn

Disassemble windows programs

Reversing jumps

Patching

Debugging windows programs

Solving crackme's

NOP instructions

Modifying EAX register values

Setting Hardware Breakpoints

Memory Patching

Intermodular Call Method

Call Stack Method

Understand how Trial Period works

Understand how Software Registration process works

Remove Nag Screens

Description

In the first course in this series entitled Reverse Engineering 1: x64dbg Debugger for Beginners, you learnt how to reverse engineer a command line program and learnt how to debug and step over and patch and much more. Now, in this 2nd course, you will continue learning. This time we will be learning how to reverse engineer graphical user interface programs. As usual, we will work with crackme's that I have written for you to practice reversing.

What you will learn:

  • How to disassemble programs into assembly code

  • Dynamic Analysis

  • Setting breakpoints and stepping through code

  • Modify program behaviour

  • Patching programs

  • Intermodular Call Method

  • Call Stack Method

  • Hardware Breakpoints

  • Memory Patching

  • Patching EAX register values

  • Understanding Trial Period software

  • Understanding Software Registration process

Thank you and see you inside.

Screenshots

Reverse Engineering 2: Windows GUI Programs - Screenshot_01Reverse Engineering 2: Windows GUI Programs - Screenshot_02Reverse Engineering 2: Windows GUI Programs - Screenshot_03Reverse Engineering 2: Windows GUI Programs - Screenshot_04

Content

Introduction

Introduction

Introduction to windows gui programs

Introduction to windows gui programs

Analyzing PE files

Analyzing PE files

Setting up x64dbg

Setting up x64dbg

Setting breakpoints on strings

Setting breakpoints on strings

Windows API functions

Windows API functions

Pushing parameters to the stack

Pushing parameters to the stack

Bypassing messages

Bypassing messages

Bypassing using xor assembly

Bypassing using xor assembly

Breakpoints on Intermodular Calls

Breakpoints on Intermodular Calls

Breakpoints from Call Stack

Breakpoints from Call Stack

Registration file checks

Registration file checks

Analyzing crackme 2

Analyzing crackme 2

Registration checks

Registration checks

Software registration

Software registration

Removing Nag screens

Removing Nag screens

Analyzing crackme 3

Analyzing crackme 3

Removing Nag screen 1

Removing Nag screen 1

Removing Nag screen 2

Removing Nag screen 2

Setting Registration Status

Setting Registration Status

Trial Periods

Trial Periods

Analyzing Trial Periods

Analyzing Trial Periods

Extending Trial Periods

Extending Trial Periods

Autogenerated serial keys

Autogenerated serial keys

Autogenerated serial keys 2

Autogenerated serial keys 2

Practical Exercise - TDC

Practical Exercise - TDC
Practical Exercise - TDC - part 2
Practical Exercise - TDC - part 3

Patching EAX register values

Patching EAX register values
Patching EAX register values - part 2

Hardware Breakpoints

Hardware Breakpoints
Hardware Breakpoints - part 2

Memory Patching

Memory Patching
Memory Patching - part 2

xAnalyzer

xAnalyzer
Configuring xAnalyzer

Serial Phishing

Intro to Serial Phishing
Analyzing the CreateFile API function
Serial Phising

Resources for Further Study

Bonus Lecture

Reviews

Lawrence
March 21, 2022
I enjoyed this course, well prepared and presented clearly. I am in the process of working on other courses by Paul Chin on Udemy. If Reverse Engineering Interests you he has a few courses here, Everything Ive completed or am working on by Paul Chin has been simply and clearly and educational.
Michael
June 26, 2021
Not a bad course. Easy to follow and understand. Again looking forward to the next Reverse Engineering course in the series. Thank you Mr Chin
Chan
May 27, 2021
Great course! However I'll like to point out that in Section 31, Serial Phishing, the file needs at least 8 'G's anywhere in the file, and not necessarily at the front of it :) Other than that, excellent course. Thanks!
David
February 7, 2021
Very structured course solid knowledge of Reverse engineer. The lecturer brings everything across in a very personable and informative way. Can only recommend Paul Chin's courses.
Mohammed
December 9, 2020
Absolutely the best class on Udemy. Professor Paul Chin is a true godsend. explains the topics very thoroughly and is a true magician when working through the crackmes. Thank you. Please keep me notified on every class you plan on teaching. I will be right there with you
Ronny
November 29, 2020
The Content repeats itself all course, if you expected to learn 4 hours in this course you will actually learn 2 hours in total. the instructor is fine, but he doesn't go in-depth about the setups, and about why it works this way, and how. for people who don't know assembly at all, it's pretty useless because they won't be able to execute the skills we are learning in real-time, the reverse engineering course doesn't go at all about assembly, and if it goes, doesn't in the depth that requires. but I think in total this course is just an explanation of how to use x64dbg,x32dbg, and doesn't teach reverse engineering at all, the only things it teaches its how to use a tool and its features. for a person who wants to know how to use the x64dbg, I really recommend this but for people who want to learn reverse engineering maybe a book would fit more.
Tatjana
November 10, 2020
All courses by this instructor (Paul Chin) are great. This one is perhaps the most useful because you'll learn to use the powerful x64dbg debugger in quite some detail. Some knowledge of x86 Assembly is helpful if you want to get the most out of this course. Anyways, this course is very informative and a lot of fun.
Jose
November 8, 2020
Aunque el curso no está en mi idioma (solo inglés), se entiende perfectamente lo que está explicando. El curso lo he encontrado muy completo y motivador. recomendable 100x100.
Nicholas
September 27, 2020
I never knew how much fun reverse engineering could be until I started taking these courses. Second time with this instructor, and even though I did some RE research of my own, the course is simple yet highly effective. The activities are engaging, fun, and not too long, so your attention is kept. Another satisfied experience!

Charts

Price

Reverse Engineering 2: Windows GUI Programs - Price chart

Rating

Reverse Engineering 2: Windows GUI Programs - Ratings chart

Enrollment distribution

Reverse Engineering 2: Windows GUI Programs - Distribution chart

Coupons

DateDiscountStatus
9/13/2020100% OFF
expired
10/16/2020100% OFF
expired
5/8/202150% OFF
expired
10/1/2021100% OFF
expired
12/4/202150% OFF
expired
4/18/202250% OFF
expired
3486498
udemy ID
9/9/2020
course created date
9/13/2020
course indexed date
Bot
course submited by