17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Reverse Engineering 4 - Software Protection
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
If you had always wanted to learn how software protection works and how to use x64dbg to unpack them, then this is the course for you. This course is an introduction to Software Protection for anyone who wants to get started in this field. It is suitable for software developers who want to learn how to protect their software and also for reverse engineers who want to fix bugs where the source code is not available.
You will learn how to use x64dbg to unpack Crackmes protected with packing and anti-debugging. A CrackMe is a small program designed to test a programmer’s reverse engineering skills.
What you will learn
How to set hardware breakpoints and analyze the unpacking header stub
Dumping unpacked executable from memory
Fixing Import Address Tables (IAT) after dumping memory.
Modify program behaviour
Patching programs
Creating loaders for process patching
What if the program cannot be unpacked
3 techniques to unpack multiple protections
Prerequisites:
Before taking this course, you should already be familiar with how to use x64dbg.
Money back guarantee:
This course is backed by a 30-day money back guarantee. So, go ahead and enroll in this course now and start reverse engineering and debugging programs the fun and easy way!
Who this course is for:
Anyone who want to know how to extract and dump exe from packed programs
Computing students who like to learn how software protection works
Reversing hobbyist who wants to level up their skills to take on packed software
An introduction to Software Protection for anyone who wants to get started in this field
[TutsNode.net] - Reverse Engineering 4 - Software Protection/16. Technique #1 Hiding debugger and using loader for process patching/1. Technique #1 Hiding debugger and using loader for process patching.mp4
142.9 MB
[TutsNode.net] - Reverse Engineering 4 - Software Protection/16. Technique #1 Hiding debugger and using loader for process patching/1. Technique #1 Hiding debugger and using loader for process patching.srt
[TutsNode.net] - Reverse Engineering 4 - Software Protection/18. Technique #3 Hiding debugger, then do Serial Phising/1. Technique #3 Hiding debugger, then do Serial Phising.mp4
206.9 MB
[TutsNode.net] - Reverse Engineering 4 - Software Protection/18. Technique #3 Hiding debugger, then do Serial Phising/1. Technique #3 Hiding debugger, then do Serial Phising.srt
16.7 KB
[TutsNode.net] - Reverse Engineering 4 - Software Protection/19. Resources for Further Study/1. Bonus Lecture.mp4
10.6 MB
[TutsNode.net] - Reverse Engineering 4 - Software Protection/19. Resources for Further Study/1. Bonus Lecture.srt
1.6 KB
[TutsNode.net] - Reverse Engineering 4 - Software Protection/19. Resources for Further Study/1.1 useful-resources-for-further-study.pdf
623.5 KB
[TutsNode.net] - Reverse Engineering 4 - Software Protection/2. Introduction to Software Protection/1. Introduction to Software Protection.mp4
45 MB
[TutsNode.net] - Reverse Engineering 4 - Software Protection/2. Introduction to Software Protection/1. Introduction to Software Protection.srt