English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 19 lectures (2h 13m) | 1.32 GB
Learn how software protection works from the inside out using the x64dbg debugger
If you had always wanted to learn how software protection works and how to use x64dbg to unpack them, then this is the course for you. This course is an introduction to Software Protection for anyone who wants to get started in this field. It is suitable for software developers who want to learn how to protect their software and also for reverse engineers who want to fix bugs where the source code is not available.
You will learn how to use x64dbg to unpack Crackmes protected with packing and anti-debugging. A CrackMe is a small program designed to test a programmer’s reverse engineering skills.
What you will learn
- How to set hardware breakpoints and analyze the unpacking header stub
- Dumping unpacked executable from memory
- Fixing Import Address Tables (IAT) after dumping memory.
- Modify program behaviour
- Patching programs
- Creating loaders for process patching
- What if the program cannot be unpacked
- 3 techniques to unpack multiple protections
Table of Contents
Introduction
1 Introduction
Introduction to Software Protection
2 Introduction to Software Protection
Downloading CrackMe 11
3 Downloading CrackMe 11
Examining the packer protection
4 Examining the packer protection
Unpacking the packed program
5 Unpacking
Patching the dumped file
6 Patching the dumped file
Introduction to Loaders
7 Introduction to Loaders
Creating a Loader
8 Creating a Loader
Introduction to Anti-Debugging Protection
9 Introduction to Anti-Debugging Protection
Downloading CrackMe 12
10 Downloading CrackMe 12
Patching Anti-Debugging API calls
11 Patching Anti-Debugging API calls
Installing the Scylla Hide plugin for anti-anti-debugging
12 Installing the Scylla Hide plugin for anti-anti-debugging
Using ScyllaHide to hide the debugger
13 Using ScyllaHide to hide the debugger
Introduction to multiple software protection
14 Introduction to multiple software protection
ways to reverse engineer multiple protections
15 ways to reverse engineer multiple protections
Technique #1 Hiding debugger and using loader for process patching
16 Technique #1 Hiding debugger and using loader for process patching
Technique #2 Hiding debugger, unpack then patch
17 Technique #2 Hiding debugger, unpack then patch
Technique #3 Hiding debugger, then do Serial Phising
18 Technique #3 Hiding debugger, then do Serial Phising
Resources for Further Study
19 Bonus Lecture
Resolve the captcha to access the links!