Reverse Engineering 2: Windows GUI Programs
Reverse engineer Windows Graphical User Interface programs with xdbg
What you’ll learn
-
Disassemble windows programs
-
Reversing jumps
-
Patching
-
Debugging windows programs
-
Solving crackme’s
-
NOP instructions
-
Modifying EAX register values
-
Setting Hardware Breakpoints
-
Memory Patching
-
Intermodular Call Method
-
Call Stack Method
-
Understand how Trial Period works
-
Understand how Software Registration process works
-
Remove Nag Screens
Requirements
-
Preferably have Completed Reverse Engineering 1: x64dbg Debugger for Beginners, or already know how to use x64dbg
-
Windows PC
Who this course is for:
- Computing students who want to learn how to disassemble and debug windows programs
- Anyone who is interested in reverse engineering
- Programmers who want to know how to fix bugs in programs without the source code