What Paul teaches in his Udemy course :
By the end of this course, you will be equipped with the basic knowledge to understand dis-assembled code and be able to modify exe files, to insert new instructions and inject new functionality to any exe files. (using x64dbg)
- Assembly Language Basics
- Reverse Engineering
- x64dbg Debugging Basics
- Modifying exe files
- Hollowing out an exe file and inserting new code
- CPU and Flag Registers
- Arithmetic Operations
- Accessing Main Memory (RAM)
- The Stack
- Function Calls
- Code Caves (unused space that can be used later without increasing size of the binary)
- Jumps
- Structured Programming
- Signed and Bit Operations
And, in further courses:
- How to crack software serial number keys
- Remove Nag Screen Reminders asking you to register
- Convert Trial Software to Fully Functional Software
- Extend 30-day Trial Period Software
- Learn Reverse Engineering and Assembly Language
- Protect your software by learning how software is being cracked
- How to Crack Software For Fun by solving CrackMe Challenges
- C/C++, delphi, VB, p-code, Assembly, C# programs covered
- Removing obfuscation, unpacking, patching, creating keygens, loaders
And of course, there's Eldad's venerable old book : https://en.wikipedia.org/wiki/Reversing:_Secrets_of_Reverse_Engineering
And then, there's xorpd - who also appears to be Israeli : https://www.xorpd.net/pages/x86_adventures.html ("You must do the exercises. You may say, 'I'm a fast learner and I can learn a lot by watching your lectures.' To this I would say, would you attempt to learn swimming by just watching lectures?"
No comments:
Post a Comment