Reverse Engineering Memory Hacking and Software Protection
This course is perfect for anyone who has always wanted to learn how to reverse and patch packed programs without unpacking. In this course, you will learn how to test the effectiveness of several popular packers by packing crackmes and then reversing them without unpacking. You will also learn how to debug packed programs in spite of anti-debugging protection, write custom trainers, modify program behavior, and create Lua scripts for process patching. By the end of this course, you will be able to gauge the effectiveness of software packers, obfuscation and anti-debugging protection and also have a good idea of how to implement extra countermeasures to improve the security of software. ▼
ADVERTISEMENT
Course Feature
Cost:
Paid
Provider:
Udemy
Certificate:
Paid Certification
Language:
English
Start Date:
2022-11-07
Course Overview
❗The content presented here is sourced directly from Udemy platform. For comprehensive course details, including enrollment information, simply click on the 'Go to class' link on our website.
Updated in [July 17th, 2023]
This course, Reverse Engineering Memory Hacking and Software Protection, is designed to teach students how to reverse and patch packed programs without unpacking them. It is a follow-up from the earlier course on Reverse Engineering & Memory Hacking and is the practical application of what was learnt in the first course. Students will learn how to test the effectiveness of several popular packers by packing crackmes and then reversing them without unpacking. They will also learn how to debug packed programs in spite of anti-debugging being implemented, as well as how to do break and trace to identify algorithms for reversing, identify addresses to do memory patching, write custom trainers (loaders) using Cheat Engine to hack and patch memory, modify program behavior, process patching programs, create Lua scripts for process patching, and test the effectiveness of anti-debugging technology. Prerequisites for this course include familiarity with x64dbg and Cheat Engine, a Windows PC, and some knowledge of Assembly (though this is not compulsory).
Course Syllabus
Introduction
Basics of Memory Hacking
Using and Evaluating VMP Protect
Using and Evaluating Enigma
Using and Evaluating Themida Code Virtualizer
Resources For Further Study
Pros & Cons
Valuable information: Users appreciate that the instructor, Paul, provides valuable information throughout the course. They feel that they have learned interesting things and find the techniques shown in the course clever and easy to execute.
Instructor's care and clarity: Users commend Paul for his care towards the students and his ability to explain things clearly. They mention that his courses are suitable for newbies as he takes the trouble to ensure that everyone can follow along.
Repetition: Some users feel that towards the end of the course, there is repetition, particularly when it comes to building custom memory hackers. They believe that the course could have been more valuable if it delved deeper into the subject matter.
Lack of variety: A few users mention that the bypasses for each packer in the course felt too similar. They note that there wasn't anything really new in each lesson, except for using different packers. They would have liked to see more diversity in the content.
Course Provider
Provider Udemy's Stats at AZClass
Discussion and Reviews
0.0 (Based on 0 reviews)
Start your review of Reverse Engineering Memory Hacking and Software Protection