Reverse Engineering 4: Software Protection

  • Course provided by Udemy
  • Study type: Online
  • Starts: Anytime
  • Price: See latest price on Udemy
Udemy

Course Description

If you had always wanted to learn how software protection works and how to use x64dbg to unpack them, then this is the course for you. This course is an introduction to Software Protection for anyone who wants to get started in this field. It is suitable for software developers who want to learn how to protect their software and also for reverse engineers who want to fix bugs where the source code is not available.

You will learn how to use x64dbg to unpack Crackmes protected with packing and anti-debugging. A CrackMe is a small program designed to test a programmer's reverse engineering skills.

What you will learn

  • How to set hardware breakpoints and analyze the unpacking header stub

  • Dumping unpacked executable from memory

  • Fixing Import Address Tables (IAT) after dumping memory.

  • Modify program behaviour

  • Patching programs

  • Creating loaders for process patching

  • What if the program cannot be unpacked

  • 3 techniques to unpack multiple protections

Prerequisites:

Before taking this course, you should already be familiar with how to use x64dbg.

Money back guarantee:

This course is backed by a 30-day money back guarantee. So, go ahead and enroll in this course now and start reverse engineering and debugging programs the fun and easy way!

Who this course is for:

  • Anyone who want to know how to extract and dump exe from packed programs
  • Computing students who like to learn how software protection works
  • Reversing hobbyist who wants to level up their skills to take on packed software
  • An introduction to Software Protection for anyone who wants to get started in this field

Course content

19 sections • 19 lectures • 2h 12m total length

Instructor

College lecturer
  • 4.4 Instructor Rating
  • 3,107 Reviews
  • 245,072 Students
  • 22 Courses

I am a semi-retired college lecturer with more than 20 years experience in teaching computing and information technology. My interests range from reversing, coding to graphics design, apps, games development, music, health, spirituality and well-being. In my spare time, I also play the piano and keyboard. I enjoy teaching face-to-face and online and also love educating and inspiring others to succeed and live the life of their dreams.

Expected Outcomes

  1. How to unpack programs Bypass anti-debuggers Patch programs Dump memory to files Use x64dbg debugger Use ScyllaHide plugin 3 ways to unpack layered protections What if the program cannot be unpacked Using loaders for process patching and more.... Curated for the Udemy Business collection Requirements Assembly language is helpful but not compulsory Windows PC Already know how to use x64dbg debugger Description If you had always wanted to learn how software protection works and how to use x64dbg to unpack them, then this is the course for you. This course is an introduction to Software Protection for anyone who wants to get started in this field. It is suitable for software developers who want to learn how to protect their software and also for reverse engineers who want to fix bugs where the source code is not available. You will learn how to use x64dbg to unpack Crackmes protected with packing and anti-debugging. A CrackMe is a small program designed to test a programmer's reverse engineering skills. What you will learn How to set hardware breakpoints and analyze the unpacking header stub Dumping unpacked executable from memory Fixing Import Address Tables (IAT) after dumping memory. Modify program behaviour Patching programs Creating loaders for process patching What if the program cannot be unpacked 3 techniques to unpack multiple protections Prerequisites: Before taking this course, you should already be familiar with how to use x64dbg. Money back guarantee: This course is backed by a 30-day money back guarantee . So, go ahead and enroll in this course now and start reverse engineering and debugging programs the fun and easy way! Who this course is for: Anyone who want to know how to extract and dump exe from packed programs Computing students who like to learn how software protection works Reversing hobbyist who wants to level up their skills to take on packed software An introduction to Software Protection for anyone who wants to get started in this field Show more Show less Course content 19 sections • 19 lectures • 2h 12m total length Expand all sections Introduction 1 lecture • 3min Introduction Preview 03:02 Introduction to Software Protection 1 lecture • 9min Introduction to Software Protection Preview 09:13 Downloading CrackMe 11 1 lecture • 7min Downloading CrackMe 11 07:04 Examining the packer protection 1 lecture • 7min Examining the packer protection 07:17 Unpacking the packed program 1 lecture • 8min Unpacking 07:56 Patching the dumped file 1 lecture • 4min Patching the dumped file 04:27 Introduction to Loaders 1 lecture • 4min Introduction to Loaders 03:56 Creating a Loader 1 lecture • 10min Creating a Loader Preview 09:30 Introduction to Anti-Debugging Protection 1 lecture • 3min Introduction to Anti-Debugging Protection 02:40 Downloading CrackMe 12 1 lecture • 5min Downloading CrackMe 12 04:33 9 more sections Instructor Paul Chin College lecturer 4.4 Instructor Rating 3,107 Reviews 245,072 Students 22 Courses I am a semi-retired college lecturer with more than 20 years experience in teaching computing and information technology. My interests range from reversing, coding to graphics design, apps, games development, music, health, spirituality and well-being. In my spare time, I also play the piano and keyboard. I enjoy teaching face-to-face and online and also love educating and inspiring others to succeed and live the life of their dreams. Show more Show less Udemy Business Teach on Udemy Get the app About us Contact us Careers Blog Help and Support Affiliate Impressum Kontakt Terms Privacy policy Cookie settings Sitemap © 2021 Udemy, Inc. window.handleCSSToggleButtonClick = function (event) { var target = event.currentTarget; var cssToggleId = target && target.dataset && target.dataset.cssToggleId; var input = cssToggleId && document.getElementById(cssToggleId); if (input) { if (input.dataset.type === 'checkbox') { input.dataset.checked = input.dataset.checked ? '' : 'checked'; } else { input.dataset.checked = input.dataset.allowToggle && input.dataset.checked ? '' : 'checked'; var radios = document.querySelectorAll('[name="' + input.dataset.name + '"]'); for (var i = 0; i (function(){window['__CF$cv$params']={r:'677e3297ab1c2ccb',m:'0deda80f716cf707de4cf4ba17112a7b8ed9126c-1627811799-1800-AeYq1gjy5OhjFfbg8huDcnMbREeWwmhefHuyM5AyA8JL9UCNm8TEQweUPVgKUV6JIJjq5JEsOJU2/iMRRKQR10cOdyDIuYhuEiYQMiG+Id3snv9Khj58ebfA/59AUiL25s/62mWi9XgmuFjGerRKjRuYsSVTqO2WQzdUpBBU9kgx',s:[0x070612f1e6,0x3f8860bbcc],}})();
  2. Bypass anti-debuggers Patch programs Dump memory to files Use x64dbg debugger Use ScyllaHide plugin 3 ways to unpack layered protections What if the program cannot be unpacked Using loaders for process patching and more.... Curated for the Udemy Business collection Requirements Assembly language is helpful but not compulsory Windows PC Already know how to use x64dbg debugger Description If you had always wanted to learn how software protection works and how to use x64dbg to unpack them, then this is the course for you. This course is an introduction to Software Protection for anyone who wants to get started in this field. It is suitable for software developers who want to learn how to protect their software and also for reverse engineers who want to fix bugs where the source code is not available. You will learn how to use x64dbg to unpack Crackmes protected with packing and anti-debugging. A CrackMe is a small program designed to test a programmer's reverse engineering skills. What you will learn How to set hardware breakpoints and analyze the unpacking header stub Dumping unpacked executable from memory Fixing Import Address Tables (IAT) after dumping memory. Modify program behaviour Patching programs Creating loaders for process patching What if the program cannot be unpacked 3 techniques to unpack multiple protections Prerequisites: Before taking this course, you should already be familiar with how to use x64dbg. Money back guarantee: This course is backed by a 30-day money back guarantee . So, go ahead and enroll in this course now and start reverse engineering and debugging programs the fun and easy way! Who this course is for: Anyone who want to know how to extract and dump exe from packed programs Computing students who like to learn how software protection works Reversing hobbyist who wants to level up their skills to take on packed software An introduction to Software Protection for anyone who wants to get started in this field Show more Show less Course content 19 sections • 19 lectures • 2h 12m total length Expand all sections Introduction 1 lecture • 3min Introduction Preview 03:02 Introduction to Software Protection 1 lecture • 9min Introduction to Software Protection Preview 09:13 Downloading CrackMe 11 1 lecture • 7min Downloading CrackMe 11 07:04 Examining the packer protection 1 lecture • 7min Examining the packer protection 07:17 Unpacking the packed program 1 lecture • 8min Unpacking 07:56 Patching the dumped file 1 lecture • 4min Patching the dumped file 04:27 Introduction to Loaders 1 lecture • 4min Introduction to Loaders 03:56 Creating a Loader 1 lecture • 10min Creating a Loader Preview 09:30 Introduction to Anti-Debugging Protection 1 lecture • 3min Introduction to Anti-Debugging Protection 02:40 Downloading CrackMe 12 1 lecture • 5min Downloading CrackMe 12 04:33 9 more sections Instructor Paul Chin College lecturer 4.4 Instructor Rating 3,107 Reviews 245,072 Students 22 Courses I am a semi-retired college lecturer with more than 20 years experience in teaching computing and information technology. My interests range from reversing, coding to graphics design, apps, games development, music, health, spirituality and well-being. In my spare time, I also play the piano and keyboard. I enjoy teaching face-to-face and online and also love educating and inspiring others to succeed and live the life of their dreams. Show more Show less Udemy Business Teach on Udemy Get the app About us Contact us Careers Blog Help and Support Affiliate Impressum Kontakt Terms Privacy policy Cookie settings Sitemap © 2021 Udemy, Inc. window.handleCSSToggleButtonClick = function (event) { var target = event.currentTarget; var cssToggleId = target && target.dataset && target.dataset.cssToggleId; var input = cssToggleId && document.getElementById(cssToggleId); if (input) { if (input.dataset.type === 'checkbox') { input.dataset.checked = input.dataset.checked ? '' : 'checked'; } else { input.dataset.checked = input.dataset.allowToggle && input.dataset.checked ? '' : 'checked'; var radios = document.querySelectorAll('[name="' + input.dataset.name + '"]'); for (var i = 0; i (function(){window['__CF$cv$params']={r:'677e3297ab1c2ccb',m:'0deda80f716cf707de4cf4ba17112a7b8ed9126c-1627811799-1800-AeYq1gjy5OhjFfbg8huDcnMbREeWwmhefHuyM5AyA8JL9UCNm8TEQweUPVgKUV6JIJjq5JEsOJU2/iMRRKQR10cOdyDIuYhuEiYQMiG+Id3snv9Khj58ebfA/59AUiL25s/62mWi9XgmuFjGerRKjRuYsSVTqO2WQzdUpBBU9kgx',s:[0x070612f1e6,0x3f8860bbcc],}})();
  3. Patch programs Dump memory to files Use x64dbg debugger Use ScyllaHide plugin 3 ways to unpack layered protections What if the program cannot be unpacked Using loaders for process patching and more.... Curated for the Udemy Business collection Requirements Assembly language is helpful but not compulsory Windows PC Already know how to use x64dbg debugger Description If you had always wanted to learn how software protection works and how to use x64dbg to unpack them, then this is the course for you. This course is an introduction to Software Protection for anyone who wants to get started in this field. It is suitable for software developers who want to learn how to protect their software and also for reverse engineers who want to fix bugs where the source code is not available. You will learn how to use x64dbg to unpack Crackmes protected with packing and anti-debugging. A CrackMe is a small program designed to test a programmer's reverse engineering skills. What you will learn How to set hardware breakpoints and analyze the unpacking header stub Dumping unpacked executable from memory Fixing Import Address Tables (IAT) after dumping memory. Modify program behaviour Patching programs Creating loaders for process patching What if the program cannot be unpacked 3 techniques to unpack multiple protections Prerequisites: Before taking this course, you should already be familiar with how to use x64dbg. Money back guarantee: This course is backed by a 30-day money back guarantee . So, go ahead and enroll in this course now and start reverse engineering and debugging programs the fun and easy way! Who this course is for: Anyone who want to know how to extract and dump exe from packed programs Computing students who like to learn how software protection works Reversing hobbyist who wants to level up their skills to take on packed software An introduction to Software Protection for anyone who wants to get started in this field Show more Show less Course content 19 sections • 19 lectures • 2h 12m total length Expand all sections Introduction 1 lecture • 3min Introduction Preview 03:02 Introduction to Software Protection 1 lecture • 9min Introduction to Software Protection Preview 09:13 Downloading CrackMe 11 1 lecture • 7min Downloading CrackMe 11 07:04 Examining the packer protection 1 lecture • 7min Examining the packer protection 07:17 Unpacking the packed program 1 lecture • 8min Unpacking 07:56 Patching the dumped file 1 lecture • 4min Patching the dumped file 04:27 Introduction to Loaders 1 lecture • 4min Introduction to Loaders 03:56 Creating a Loader 1 lecture • 10min Creating a Loader Preview 09:30 Introduction to Anti-Debugging Protection 1 lecture • 3min Introduction to Anti-Debugging Protection 02:40 Downloading CrackMe 12 1 lecture • 5min Downloading CrackMe 12 04:33 9 more sections Instructor Paul Chin College lecturer 4.4 Instructor Rating 3,107 Reviews 245,072 Students 22 Courses I am a semi-retired college lecturer with more than 20 years experience in teaching computing and information technology. My interests range from reversing, coding to graphics design, apps, games development, music, health, spirituality and well-being. In my spare time, I also play the piano and keyboard. I enjoy teaching face-to-face and online and also love educating and inspiring others to succeed and live the life of their dreams. Show more Show less Udemy Business Teach on Udemy Get the app About us Contact us Careers Blog Help and Support Affiliate Impressum Kontakt Terms Privacy policy Cookie settings Sitemap © 2021 Udemy, Inc. window.handleCSSToggleButtonClick = function (event) { var target = event.currentTarget; var cssToggleId = target && target.dataset && target.dataset.cssToggleId; var input = cssToggleId && document.getElementById(cssToggleId); if (input) { if (input.dataset.type === 'checkbox') { input.dataset.checked = input.dataset.checked ? '' : 'checked'; } else { input.dataset.checked = input.dataset.allowToggle && input.dataset.checked ? '' : 'checked'; var radios = document.querySelectorAll('[name="' + input.dataset.name + '"]'); for (var i = 0; i (function(){window['__CF$cv$params']={r:'677e3297ab1c2ccb',m:'0deda80f716cf707de4cf4ba17112a7b8ed9126c-1627811799-1800-AeYq1gjy5OhjFfbg8huDcnMbREeWwmhefHuyM5AyA8JL9UCNm8TEQweUPVgKUV6JIJjq5JEsOJU2/iMRRKQR10cOdyDIuYhuEiYQMiG+Id3snv9Khj58ebfA/59AUiL25s/62mWi9XgmuFjGerRKjRuYsSVTqO2WQzdUpBBU9kgx',s:[0x070612f1e6,0x3f8860bbcc],}})();
  4. Dump memory to files Use x64dbg debugger Use ScyllaHide plugin 3 ways to unpack layered protections What if the program cannot be unpacked Using loaders for process patching and more.... Curated for the Udemy Business collection Requirements Assembly language is helpful but not compulsory Windows PC Already know how to use x64dbg debugger Description If you had always wanted to learn how software protection works and how to use x64dbg to unpack them, then this is the course for you. This course is an introduction to Software Protection for anyone who wants to get started in this field. It is suitable for software developers who want to learn how to protect their software and also for reverse engineers who want to fix bugs where the source code is not available. You will learn how to use x64dbg to unpack Crackmes protected with packing and anti-debugging. A CrackMe is a small program designed to test a programmer's reverse engineering skills. What you will learn How to set hardware breakpoints and analyze the unpacking header stub Dumping unpacked executable from memory Fixing Import Address Tables (IAT) after dumping memory. Modify program behaviour Patching programs Creating loaders for process patching What if the program cannot be unpacked 3 techniques to unpack multiple protections Prerequisites: Before taking this course, you should already be familiar with how to use x64dbg. Money back guarantee: This course is backed by a 30-day money back guarantee . So, go ahead and enroll in this course now and start reverse engineering and debugging programs the fun and easy way! Who this course is for: Anyone who want to know how to extract and dump exe from packed programs Computing students who like to learn how software protection works Reversing hobbyist who wants to level up their skills to take on packed software An introduction to Software Protection for anyone who wants to get started in this field Show more Show less Course content 19 sections • 19 lectures • 2h 12m total length Expand all sections Introduction 1 lecture • 3min Introduction Preview 03:02 Introduction to Software Protection 1 lecture • 9min Introduction to Software Protection Preview 09:13 Downloading CrackMe 11 1 lecture • 7min Downloading CrackMe 11 07:04 Examining the packer protection 1 lecture • 7min Examining the packer protection 07:17 Unpacking the packed program 1 lecture • 8min Unpacking 07:56 Patching the dumped file 1 lecture • 4min Patching the dumped file 04:27 Introduction to Loaders 1 lecture • 4min Introduction to Loaders 03:56 Creating a Loader 1 lecture • 10min Creating a Loader Preview 09:30 Introduction to Anti-Debugging Protection 1 lecture • 3min Introduction to Anti-Debugging Protection 02:40 Downloading CrackMe 12 1 lecture • 5min Downloading CrackMe 12 04:33 9 more sections Instructor Paul Chin College lecturer 4.4 Instructor Rating 3,107 Reviews 245,072 Students 22 Courses I am a semi-retired college lecturer with more than 20 years experience in teaching computing and information technology. My interests range from reversing, coding to graphics design, apps, games development, music, health, spirituality and well-being. In my spare time, I also play the piano and keyboard. I enjoy teaching face-to-face and online and also love educating and inspiring others to succeed and live the life of their dreams. Show more Show less Udemy Business Teach on Udemy Get the app About us Contact us Careers Blog Help and Support Affiliate Impressum Kontakt Terms Privacy policy Cookie settings Sitemap © 2021 Udemy, Inc. window.handleCSSToggleButtonClick = function (event) { var target = event.currentTarget; var cssToggleId = target && target.dataset && target.dataset.cssToggleId; var input = cssToggleId && document.getElementById(cssToggleId); if (input) { if (input.dataset.type === 'checkbox') { input.dataset.checked = input.dataset.checked ? '' : 'checked'; } else { input.dataset.checked = input.dataset.allowToggle && input.dataset.checked ? '' : 'checked'; var radios = document.querySelectorAll('[name="' + input.dataset.name + '"]'); for (var i = 0; i (function(){window['__CF$cv$params']={r:'677e3297ab1c2ccb',m:'0deda80f716cf707de4cf4ba17112a7b8ed9126c-1627811799-1800-AeYq1gjy5OhjFfbg8huDcnMbREeWwmhefHuyM5AyA8JL9UCNm8TEQweUPVgKUV6JIJjq5JEsOJU2/iMRRKQR10cOdyDIuYhuEiYQMiG+Id3snv9Khj58ebfA/59AUiL25s/62mWi9XgmuFjGerRKjRuYsSVTqO2WQzdUpBBU9kgx',s:[0x070612f1e6,0x3f8860bbcc],}})();
  5. Use x64dbg debugger Use ScyllaHide plugin 3 ways to unpack layered protections What if the program cannot be unpacked Using loaders for process patching and more.... Curated for the Udemy Business collection Requirements Assembly language is helpful but not compulsory Windows PC Already know how to use x64dbg debugger Description If you had always wanted to learn how software protection works and how to use x64dbg to unpack them, then this is the course for you. This course is an introduction to Software Protection for anyone who wants to get started in this field. It is suitable for software developers who want to learn how to protect their software and also for reverse engineers who want to fix bugs where the source code is not available. You will learn how to use x64dbg to unpack Crackmes protected with packing and anti-debugging. A CrackMe is a small program designed to test a programmer's reverse engineering skills. What you will learn How to set hardware breakpoints and analyze the unpacking header stub Dumping unpacked executable from memory Fixing Import Address Tables (IAT) after dumping memory. Modify program behaviour Patching programs Creating loaders for process patching What if the program cannot be unpacked 3 techniques to unpack multiple protections Prerequisites: Before taking this course, you should already be familiar with how to use x64dbg. Money back guarantee: This course is backed by a 30-day money back guarantee . So, go ahead and enroll in this course now and start reverse engineering and debugging programs the fun and easy way! Who this course is for: Anyone who want to know how to extract and dump exe from packed programs Computing students who like to learn how software protection works Reversing hobbyist who wants to level up their skills to take on packed software An introduction to Software Protection for anyone who wants to get started in this field Show more Show less Course content 19 sections • 19 lectures • 2h 12m total length Expand all sections Introduction 1 lecture • 3min Introduction Preview 03:02 Introduction to Software Protection 1 lecture • 9min Introduction to Software Protection Preview 09:13 Downloading CrackMe 11 1 lecture • 7min Downloading CrackMe 11 07:04 Examining the packer protection 1 lecture • 7min Examining the packer protection 07:17 Unpacking the packed program 1 lecture • 8min Unpacking 07:56 Patching the dumped file 1 lecture • 4min Patching the dumped file 04:27 Introduction to Loaders 1 lecture • 4min Introduction to Loaders 03:56 Creating a Loader 1 lecture • 10min Creating a Loader Preview 09:30 Introduction to Anti-Debugging Protection 1 lecture • 3min Introduction to Anti-Debugging Protection 02:40 Downloading CrackMe 12 1 lecture • 5min Downloading CrackMe 12 04:33 9 more sections Instructor Paul Chin College lecturer 4.4 Instructor Rating 3,107 Reviews 245,072 Students 22 Courses I am a semi-retired college lecturer with more than 20 years experience in teaching computing and information technology. My interests range from reversing, coding to graphics design, apps, games development, music, health, spirituality and well-being. In my spare time, I also play the piano and keyboard. I enjoy teaching face-to-face and online and also love educating and inspiring others to succeed and live the life of their dreams. Show more Show less Udemy Business Teach on Udemy Get the app About us Contact us Careers Blog Help and Support Affiliate Impressum Kontakt Terms Privacy policy Cookie settings Sitemap © 2021 Udemy, Inc. window.handleCSSToggleButtonClick = function (event) { var target = event.currentTarget; var cssToggleId = target && target.dataset && target.dataset.cssToggleId; var input = cssToggleId && document.getElementById(cssToggleId); if (input) { if (input.dataset.type === 'checkbox') { input.dataset.checked = input.dataset.checked ? '' : 'checked'; } else { input.dataset.checked = input.dataset.allowToggle && input.dataset.checked ? '' : 'checked'; var radios = document.querySelectorAll('[name="' + input.dataset.name + '"]'); for (var i = 0; i (function(){window['__CF$cv$params']={r:'677e3297ab1c2ccb',m:'0deda80f716cf707de4cf4ba17112a7b8ed9126c-1627811799-1800-AeYq1gjy5OhjFfbg8huDcnMbREeWwmhefHuyM5AyA8JL9UCNm8TEQweUPVgKUV6JIJjq5JEsOJU2/iMRRKQR10cOdyDIuYhuEiYQMiG+Id3snv9Khj58ebfA/59AUiL25s/62mWi9XgmuFjGerRKjRuYsSVTqO2WQzdUpBBU9kgx',s:[0x070612f1e6,0x3f8860bbcc],}})();
  6. Use ScyllaHide plugin 3 ways to unpack layered protections What if the program cannot be unpacked Using loaders for process patching and more.... Curated for the Udemy Business collection Requirements Assembly language is helpful but not compulsory Windows PC Already know how to use x64dbg debugger Description If you had always wanted to learn how software protection works and how to use x64dbg to unpack them, then this is the course for you. This course is an introduction to Software Protection for anyone who wants to get started in this field. It is suitable for software developers who want to learn how to protect their software and also for reverse engineers who want to fix bugs where the source code is not available. You will learn how to use x64dbg to unpack Crackmes protected with packing and anti-debugging. A CrackMe is a small program designed to test a programmer's reverse engineering skills. What you will learn How to set hardware breakpoints and analyze the unpacking header stub Dumping unpacked executable from memory Fixing Import Address Tables (IAT) after dumping memory. Modify program behaviour Patching programs Creating loaders for process patching What if the program cannot be unpacked 3 techniques to unpack multiple protections Prerequisites: Before taking this course, you should already be familiar with how to use x64dbg. Money back guarantee: This course is backed by a 30-day money back guarantee . So, go ahead and enroll in this course now and start reverse engineering and debugging programs the fun and easy way! Who this course is for: Anyone who want to know how to extract and dump exe from packed programs Computing students who like to learn how software protection works Reversing hobbyist who wants to level up their skills to take on packed software An introduction to Software Protection for anyone who wants to get started in this field Show more Show less Course content 19 sections • 19 lectures • 2h 12m total length Expand all sections Introduction 1 lecture • 3min Introduction Preview 03:02 Introduction to Software Protection 1 lecture • 9min Introduction to Software Protection Preview 09:13 Downloading CrackMe 11 1 lecture • 7min Downloading CrackMe 11 07:04 Examining the packer protection 1 lecture • 7min Examining the packer protection 07:17 Unpacking the packed program 1 lecture • 8min Unpacking 07:56 Patching the dumped file 1 lecture • 4min Patching the dumped file 04:27 Introduction to Loaders 1 lecture • 4min Introduction to Loaders 03:56 Creating a Loader 1 lecture • 10min Creating a Loader Preview 09:30 Introduction to Anti-Debugging Protection 1 lecture • 3min Introduction to Anti-Debugging Protection 02:40 Downloading CrackMe 12 1 lecture • 5min Downloading CrackMe 12 04:33 9 more sections Instructor Paul Chin College lecturer 4.4 Instructor Rating 3,107 Reviews 245,072 Students 22 Courses I am a semi-retired college lecturer with more than 20 years experience in teaching computing and information technology. My interests range from reversing, coding to graphics design, apps, games development, music, health, spirituality and well-being. In my spare time, I also play the piano and keyboard. I enjoy teaching face-to-face and online and also love educating and inspiring others to succeed and live the life of their dreams. Show more Show less Udemy Business Teach on Udemy Get the app About us Contact us Careers Blog Help and Support Affiliate Impressum Kontakt Terms Privacy policy Cookie settings Sitemap © 2021 Udemy, Inc. window.handleCSSToggleButtonClick = function (event) { var target = event.currentTarget; var cssToggleId = target && target.dataset && target.dataset.cssToggleId; var input = cssToggleId && document.getElementById(cssToggleId); if (input) { if (input.dataset.type === 'checkbox') { input.dataset.checked = input.dataset.checked ? '' : 'checked'; } else { input.dataset.checked = input.dataset.allowToggle && input.dataset.checked ? '' : 'checked'; var radios = document.querySelectorAll('[name="' + input.dataset.name + '"]'); for (var i = 0; i (function(){window['__CF$cv$params']={r:'677e3297ab1c2ccb',m:'0deda80f716cf707de4cf4ba17112a7b8ed9126c-1627811799-1800-AeYq1gjy5OhjFfbg8huDcnMbREeWwmhefHuyM5AyA8JL9UCNm8TEQweUPVgKUV6JIJjq5JEsOJU2/iMRRKQR10cOdyDIuYhuEiYQMiG+Id3snv9Khj58ebfA/59AUiL25s/62mWi9XgmuFjGerRKjRuYsSVTqO2WQzdUpBBU9kgx',s:[0x070612f1e6,0x3f8860bbcc],}})();
  7. 3 ways to unpack layered protections What if the program cannot be unpacked Using loaders for process patching and more.... Curated for the Udemy Business collection Requirements Assembly language is helpful but not compulsory Windows PC Already know how to use x64dbg debugger Description If you had always wanted to learn how software protection works and how to use x64dbg to unpack them, then this is the course for you. This course is an introduction to Software Protection for anyone who wants to get started in this field. It is suitable for software developers who want to learn how to protect their software and also for reverse engineers who want to fix bugs where the source code is not available. You will learn how to use x64dbg to unpack Crackmes protected with packing and anti-debugging. A CrackMe is a small program designed to test a programmer's reverse engineering skills. What you will learn How to set hardware breakpoints and analyze the unpacking header stub Dumping unpacked executable from memory Fixing Import Address Tables (IAT) after dumping memory. Modify program behaviour Patching programs Creating loaders for process patching What if the program cannot be unpacked 3 techniques to unpack multiple protections Prerequisites: Before taking this course, you should already be familiar with how to use x64dbg. Money back guarantee: This course is backed by a 30-day money back guarantee . So, go ahead and enroll in this course now and start reverse engineering and debugging programs the fun and easy way! Who this course is for: Anyone who want to know how to extract and dump exe from packed programs Computing students who like to learn how software protection works Reversing hobbyist who wants to level up their skills to take on packed software An introduction to Software Protection for anyone who wants to get started in this field Show more Show less Course content 19 sections • 19 lectures • 2h 12m total length Expand all sections Introduction 1 lecture • 3min Introduction Preview 03:02 Introduction to Software Protection 1 lecture • 9min Introduction to Software Protection Preview 09:13 Downloading CrackMe 11 1 lecture • 7min Downloading CrackMe 11 07:04 Examining the packer protection 1 lecture • 7min Examining the packer protection 07:17 Unpacking the packed program 1 lecture • 8min Unpacking 07:56 Patching the dumped file 1 lecture • 4min Patching the dumped file 04:27 Introduction to Loaders 1 lecture • 4min Introduction to Loaders 03:56 Creating a Loader 1 lecture • 10min Creating a Loader Preview 09:30 Introduction to Anti-Debugging Protection 1 lecture • 3min Introduction to Anti-Debugging Protection 02:40 Downloading CrackMe 12 1 lecture • 5min Downloading CrackMe 12 04:33 9 more sections Instructor Paul Chin College lecturer 4.4 Instructor Rating 3,107 Reviews 245,072 Students 22 Courses I am a semi-retired college lecturer with more than 20 years experience in teaching computing and information technology. My interests range from reversing, coding to graphics design, apps, games development, music, health, spirituality and well-being. In my spare time, I also play the piano and keyboard. I enjoy teaching face-to-face and online and also love educating and inspiring others to succeed and live the life of their dreams. Show more Show less Udemy Business Teach on Udemy Get the app About us Contact us Careers Blog Help and Support Affiliate Impressum Kontakt Terms Privacy policy Cookie settings Sitemap © 2021 Udemy, Inc. window.handleCSSToggleButtonClick = function (event) { var target = event.currentTarget; var cssToggleId = target && target.dataset && target.dataset.cssToggleId; var input = cssToggleId && document.getElementById(cssToggleId); if (input) { if (input.dataset.type === 'checkbox') { input.dataset.checked = input.dataset.checked ? '' : 'checked'; } else { input.dataset.checked = input.dataset.allowToggle && input.dataset.checked ? '' : 'checked'; var radios = document.querySelectorAll('[name="' + input.dataset.name + '"]'); for (var i = 0; i (function(){window['__CF$cv$params']={r:'677e3297ab1c2ccb',m:'0deda80f716cf707de4cf4ba17112a7b8ed9126c-1627811799-1800-AeYq1gjy5OhjFfbg8huDcnMbREeWwmhefHuyM5AyA8JL9UCNm8TEQweUPVgKUV6JIJjq5JEsOJU2/iMRRKQR10cOdyDIuYhuEiYQMiG+Id3snv9Khj58ebfA/59AUiL25s/62mWi9XgmuFjGerRKjRuYsSVTqO2WQzdUpBBU9kgx',s:[0x070612f1e6,0x3f8860bbcc],}})();
  8. What if the program cannot be unpacked Using loaders for process patching and more.... Curated for the Udemy Business collection Requirements Assembly language is helpful but not compulsory Windows PC Already know how to use x64dbg debugger Description If you had always wanted to learn how software protection works and how to use x64dbg to unpack them, then this is the course for you. This course is an introduction to Software Protection for anyone who wants to get started in this field. It is suitable for software developers who want to learn how to protect their software and also for reverse engineers who want to fix bugs where the source code is not available. You will learn how to use x64dbg to unpack Crackmes protected with packing and anti-debugging. A CrackMe is a small program designed to test a programmer's reverse engineering skills. What you will learn How to set hardware breakpoints and analyze the unpacking header stub Dumping unpacked executable from memory Fixing Import Address Tables (IAT) after dumping memory. Modify program behaviour Patching programs Creating loaders for process patching What if the program cannot be unpacked 3 techniques to unpack multiple protections Prerequisites: Before taking this course, you should already be familiar with how to use x64dbg. Money back guarantee: This course is backed by a 30-day money back guarantee . So, go ahead and enroll in this course now and start reverse engineering and debugging programs the fun and easy way! Who this course is for: Anyone who want to know how to extract and dump exe from packed programs Computing students who like to learn how software protection works Reversing hobbyist who wants to level up their skills to take on packed software An introduction to Software Protection for anyone who wants to get started in this field Show more Show less Course content 19 sections • 19 lectures • 2h 12m total length Expand all sections Introduction 1 lecture • 3min Introduction Preview 03:02 Introduction to Software Protection 1 lecture • 9min Introduction to Software Protection Preview 09:13 Downloading CrackMe 11 1 lecture • 7min Downloading CrackMe 11 07:04 Examining the packer protection 1 lecture • 7min Examining the packer protection 07:17 Unpacking the packed program 1 lecture • 8min Unpacking 07:56 Patching the dumped file 1 lecture • 4min Patching the dumped file 04:27 Introduction to Loaders 1 lecture • 4min Introduction to Loaders 03:56 Creating a Loader 1 lecture • 10min Creating a Loader Preview 09:30 Introduction to Anti-Debugging Protection 1 lecture • 3min Introduction to Anti-Debugging Protection 02:40 Downloading CrackMe 12 1 lecture • 5min Downloading CrackMe 12 04:33 9 more sections Instructor Paul Chin College lecturer 4.4 Instructor Rating 3,107 Reviews 245,072 Students 22 Courses I am a semi-retired college lecturer with more than 20 years experience in teaching computing and information technology. My interests range from reversing, coding to graphics design, apps, games development, music, health, spirituality and well-being. In my spare time, I also play the piano and keyboard. I enjoy teaching face-to-face and online and also love educating and inspiring others to succeed and live the life of their dreams. Show more Show less Udemy Business Teach on Udemy Get the app About us Contact us Careers Blog Help and Support Affiliate Impressum Kontakt Terms Privacy policy Cookie settings Sitemap © 2021 Udemy, Inc. window.handleCSSToggleButtonClick = function (event) { var target = event.currentTarget; var cssToggleId = target && target.dataset && target.dataset.cssToggleId; var input = cssToggleId && document.getElementById(cssToggleId); if (input) { if (input.dataset.type === 'checkbox') { input.dataset.checked = input.dataset.checked ? '' : 'checked'; } else { input.dataset.checked = input.dataset.allowToggle && input.dataset.checked ? '' : 'checked'; var radios = document.querySelectorAll('[name="' + input.dataset.name + '"]'); for (var i = 0; i (function(){window['__CF$cv$params']={r:'677e3297ab1c2ccb',m:'0deda80f716cf707de4cf4ba17112a7b8ed9126c-1627811799-1800-AeYq1gjy5OhjFfbg8huDcnMbREeWwmhefHuyM5AyA8JL9UCNm8TEQweUPVgKUV6JIJjq5JEsOJU2/iMRRKQR10cOdyDIuYhuEiYQMiG+Id3snv9Khj58ebfA/59AUiL25s/62mWi9XgmuFjGerRKjRuYsSVTqO2WQzdUpBBU9kgx',s:[0x070612f1e6,0x3f8860bbcc],}})();
  9. Using loaders for process patching and more.... Curated for the Udemy Business collection Requirements Assembly language is helpful but not compulsory Windows PC Already know how to use x64dbg debugger Description If you had always wanted to learn how software protection works and how to use x64dbg to unpack them, then this is the course for you. This course is an introduction to Software Protection for anyone who wants to get started in this field. It is suitable for software developers who want to learn how to protect their software and also for reverse engineers who want to fix bugs where the source code is not available. You will learn how to use x64dbg to unpack Crackmes protected with packing and anti-debugging. A CrackMe is a small program designed to test a programmer's reverse engineering skills. What you will learn How to set hardware breakpoints and analyze the unpacking header stub Dumping unpacked executable from memory Fixing Import Address Tables (IAT) after dumping memory. Modify program behaviour Patching programs Creating loaders for process patching What if the program cannot be unpacked 3 techniques to unpack multiple protections Prerequisites: Before taking this course, you should already be familiar with how to use x64dbg. Money back guarantee: This course is backed by a 30-day money back guarantee . So, go ahead and enroll in this course now and start reverse engineering and debugging programs the fun and easy way! Who this course is for: Anyone who want to know how to extract and dump exe from packed programs Computing students who like to learn how software protection works Reversing hobbyist who wants to level up their skills to take on packed software An introduction to Software Protection for anyone who wants to get started in this field Show more Show less Course content 19 sections • 19 lectures • 2h 12m total length Expand all sections Introduction 1 lecture • 3min Introduction Preview 03:02 Introduction to Software Protection 1 lecture • 9min Introduction to Software Protection Preview 09:13 Downloading CrackMe 11 1 lecture • 7min Downloading CrackMe 11 07:04 Examining the packer protection 1 lecture • 7min Examining the packer protection 07:17 Unpacking the packed program 1 lecture • 8min Unpacking 07:56 Patching the dumped file 1 lecture • 4min Patching the dumped file 04:27 Introduction to Loaders 1 lecture • 4min Introduction to Loaders 03:56 Creating a Loader 1 lecture • 10min Creating a Loader Preview 09:30 Introduction to Anti-Debugging Protection 1 lecture • 3min Introduction to Anti-Debugging Protection 02:40 Downloading CrackMe 12 1 lecture • 5min Downloading CrackMe 12 04:33 9 more sections Instructor Paul Chin College lecturer 4.4 Instructor Rating 3,107 Reviews 245,072 Students 22 Courses I am a semi-retired college lecturer with more than 20 years experience in teaching computing and information technology. My interests range from reversing, coding to graphics design, apps, games development, music, health, spirituality and well-being. In my spare time, I also play the piano and keyboard. I enjoy teaching face-to-face and online and also love educating and inspiring others to succeed and live the life of their dreams. Show more Show less Udemy Business Teach on Udemy Get the app About us Contact us Careers Blog Help and Support Affiliate Impressum Kontakt Terms Privacy policy Cookie settings Sitemap © 2021 Udemy, Inc. window.handleCSSToggleButtonClick = function (event) { var target = event.currentTarget; var cssToggleId = target && target.dataset && target.dataset.cssToggleId; var input = cssToggleId && document.getElementById(cssToggleId); if (input) { if (input.dataset.type === 'checkbox') { input.dataset.checked = input.dataset.checked ? '' : 'checked'; } else { input.dataset.checked = input.dataset.allowToggle && input.dataset.checked ? '' : 'checked'; var radios = document.querySelectorAll('[name="' + input.dataset.name + '"]'); for (var i = 0; i (function(){window['__CF$cv$params']={r:'677e3297ab1c2ccb',m:'0deda80f716cf707de4cf4ba17112a7b8ed9126c-1627811799-1800-AeYq1gjy5OhjFfbg8huDcnMbREeWwmhefHuyM5AyA8JL9UCNm8TEQweUPVgKUV6JIJjq5JEsOJU2/iMRRKQR10cOdyDIuYhuEiYQMiG+Id3snv9Khj58ebfA/59AUiL25s/62mWi9XgmuFjGerRKjRuYsSVTqO2WQzdUpBBU9kgx',s:[0x070612f1e6,0x3f8860bbcc],}})();
  10. and more.... Curated for the Udemy Business collection Requirements Assembly language is helpful but not compulsory Windows PC Already know how to use x64dbg debugger Description If you had always wanted to learn how software protection works and how to use x64dbg to unpack them, then this is the course for you. This course is an introduction to Software Protection for anyone who wants to get started in this field. It is suitable for software developers who want to learn how to protect their software and also for reverse engineers who want to fix bugs where the source code is not available. You will learn how to use x64dbg to unpack Crackmes protected with packing and anti-debugging. A CrackMe is a small program designed to test a programmer's reverse engineering skills. What you will learn How to set hardware breakpoints and analyze the unpacking header stub Dumping unpacked executable from memory Fixing Import Address Tables (IAT) after dumping memory. Modify program behaviour Patching programs Creating loaders for process patching What if the program cannot be unpacked 3 techniques to unpack multiple protections Prerequisites: Before taking this course, you should already be familiar with how to use x64dbg. Money back guarantee: This course is backed by a 30-day money back guarantee . So, go ahead and enroll in this course now and start reverse engineering and debugging programs the fun and easy way! Who this course is for: Anyone who want to know how to extract and dump exe from packed programs Computing students who like to learn how software protection works Reversing hobbyist who wants to level up their skills to take on packed software An introduction to Software Protection for anyone who wants to get started in this field Show more Show less Course content 19 sections • 19 lectures • 2h 12m total length Expand all sections Introduction 1 lecture • 3min Introduction Preview 03:02 Introduction to Software Protection 1 lecture • 9min Introduction to Software Protection Preview 09:13 Downloading CrackMe 11 1 lecture • 7min Downloading CrackMe 11 07:04 Examining the packer protection 1 lecture • 7min Examining the packer protection 07:17 Unpacking the packed program 1 lecture • 8min Unpacking 07:56 Patching the dumped file 1 lecture • 4min Patching the dumped file 04:27 Introduction to Loaders 1 lecture • 4min Introduction to Loaders 03:56 Creating a Loader 1 lecture • 10min Creating a Loader Preview 09:30 Introduction to Anti-Debugging Protection 1 lecture • 3min Introduction to Anti-Debugging Protection 02:40 Downloading CrackMe 12 1 lecture • 5min Downloading CrackMe 12 04:33 9 more sections Instructor Paul Chin College lecturer 4.4 Instructor Rating 3,107 Reviews 245,072 Students 22 Courses I am a semi-retired college lecturer with more than 20 years experience in teaching computing and information technology. My interests range from reversing, coding to graphics design, apps, games development, music, health, spirituality and well-being. In my spare time, I also play the piano and keyboard. I enjoy teaching face-to-face and online and also love educating and inspiring others to succeed and live the life of their dreams. Show more Show less Udemy Business Teach on Udemy Get the app About us Contact us Careers Blog Help and Support Affiliate Impressum Kontakt Terms Privacy policy Cookie settings Sitemap © 2021 Udemy, Inc. window.handleCSSToggleButtonClick = function (event) { var target = event.currentTarget; var cssToggleId = target && target.dataset && target.dataset.cssToggleId; var input = cssToggleId && document.getElementById(cssToggleId); if (input) { if (input.dataset.type === 'checkbox') { input.dataset.checked = input.dataset.checked ? '' : 'checked'; } else { input.dataset.checked = input.dataset.allowToggle && input.dataset.checked ? '' : 'checked'; var radios = document.querySelectorAll('[name="' + input.dataset.name + '"]'); for (var i = 0; i (function(){window['__CF$cv$params']={r:'677e3297ab1c2ccb',m:'0deda80f716cf707de4cf4ba17112a7b8ed9126c-1627811799-1800-AeYq1gjy5OhjFfbg8huDcnMbREeWwmhefHuyM5AyA8JL9UCNm8TEQweUPVgKUV6JIJjq5JEsOJU2/iMRRKQR10cOdyDIuYhuEiYQMiG+Id3snv9Khj58ebfA/59AUiL25s/62mWi9XgmuFjGerRKjRuYsSVTqO2WQzdUpBBU9kgx',s:[0x070612f1e6,0x3f8860bbcc],}})();