2 Years of Service
80%

MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: German | Size: 2.64GB | Duration: 3h 45m
A perfect introduction to the topic
What you'll learn
you get to know all 32 and 64 bit registers
you get to know all register commands
which protection software is behind the exe
dealing with IDA, X92DBG, Cutter,Die, Ghidra, Procdot,PROCMON
dealing with Cheat Engine
Requirements
PC
Have you always wanted to get started with reverse engineering? Then this course is the right introductory course for reverse engineering. Here you will learn how to test your EXE for vulnerabilities,
how to bypass anti-debuggers and how assembler code is structured. However, before you start hacking, you first need to find out what the program was written in and what obfuscator or protection software was used to protect the program. Then let's look at all the assembler commands and register entries in theory and in the practice. You will also get to know the registry and learn how to pentest program trial versions. Of course, Procdot and Procmon, Fakenet-ng, which record all activities, including which server the program accesses, how often it does it, should not be missing. which files it creates, which files it changes due to the response from the server, etc. We can then evaluate these later and find out where individual values are stored and who owns the server and what the website is called. Of course, Cheatengine, Ghidra and IDA pro also help us, so that our effort is significantly reduced. As you can see, this course is a perfect introduction to the topic of reverse engineering.
To see this hidden content, you must like this content.