• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Reverse Engineering [Udemy] Reverse Engineering x64dbg Graphical Static Analysis

Status
Not open for further replies.

Aragorn

Aspiring Hacker
User
Joined
May 1, 2024
Messages
388
Reputation
0
Reaction score
289
Points
63
Credits
614
‎1 Year of Service‎
56%
Screenshot-11.png

 ​

If you had always wanted to learn how to reverse engineer a program and understand how it works from the inside out, then this is the course for you. Except for IDA Pro, many other debuggers out there are not capable of performing graphical representation of a disassembled software. x64dbg however can do it. It can disassemble a program and also represent it as a graphical representation. This makes it ideal as a free tool to perform what IDA Pro can do - i.e. static analysis.

Unfortunately, there is not much information on the Internet on how to use x64dbg to do static analysis, hence this course. You can use its powerful graphical tool for Reverse Engineering, Malware Analysis and Software Debugging. In this course we will learn how to disassemble a program and represent it an a graphical view so as to be able to easily analyse and understand how the program works - and also to patch programs. The hidden power of x64dbg lies in its ability to run a live debugging session simultaneously with graphical static analysis. And I will show you how to do it in this course.

What you will learn:
1)How to disassemble programs into assembly code and show it in a graphical representation
2)Graphical Static Analysis
3)Setting breakpoints and stepping through code
4)Modify program behaviour
5)Reversing jumps
6)Changing register values
7)Patching programs

To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top