$999.99
Buy Now
Or preview some of the content.
466 Minutes of Personalized Content
38 Lectures
Assignments
4 Attachments
Certificate of Completion
Lifetime Access to Course & Updates
Satisfaction Guarantee

Training 5+ people?
Contact us for offers and discounts.

Reverse Engineering

From understanding binary code to creating keygens.



5.0
( 2 ratings) 9 students enrolled
Created by ZDResearch Training Last updated 5/2018

Description

Reverse engineering is the art of understanding machine code and meddling with it. An expert reverse engineer can change a binary (compiled) or non-binary (interpreted) application in any way s/he wants, pretty much like s/he has access to the source code. This course teaches you to be an expert reverse engineer.

On top of that, you will learn methods to increase your performance, you will get to know the tools of the trade and master them, learn how to protect against reverse engineering and more importantly, how to bypass all those protections.

PRE-REQUIREMENTS

Assembly language, computer programming, familiarity with C programming language.

GOALS

Participants will be able to trace, understand and modify binary files to achieve any desired effect. On top of that, they will be able to find possible security flaws in an application.

Topics

  • Understand Concepts and Techniques of Reverse Engineering
  • Reverse Engineer Binaries
  • Reverse Engineer Non-Binaries
  • Pack and Protect Software
  • Unpack Software and Remove DRM
  • Elementary Malware Analysis
  • Learn How to Use Reverse Engineering Tools

Requirements

  • Computer Architecture
  • x86 Assembly
  • Computer Programming
  • Windows

Target Audience

  • DRM Developers
  • Crackers
  • Exploit Developers
  • Malware Analysts
Expand All 38 items07:46:46

Curriculum

1 Introduction
21 1. Lecture 1 - CPU and RAM
22 2. Lecture 2 - Assembly Language
23 3. Lecture 3 - Operating System Internals
24 4. Lecture 4 - Portable Executable
25 5. Lecture 5 - Reversing Tools
2 Legal Software Protection Reversing
27 7. Lecture 2 - IDA Pro
28 8. Lecture 3 - OllyDbg
29 9. Lecture 4 - Delphi
31 11. Lecture 6 - Serial Fishing
32 12. Lecture 7 - Keygen
33 13. Lecture 8 - Adding Features to Binaries
34 14. Lecture 9 - Serial Check Bypass
35 15. Lecture 10 - Integrity Checks
36 16. Lecture 11 - Multi-Threaded Applications
37 17. Lecture 12 - Child Processes
3 Reversing Protected Binaries
43 18. Lecture 1 - Chapter 3 - Protected Binaries
38 19. Lecture 2 - General Unpacking
39 20. Lecture 3 - Unpacking Packers and Overlay
40 21. Lecture 4 - API Redirection
41 22. Lecture 5 - Inline Patching
42 23. Lecture 6 - Loaders
4 Reverse Engineering Non-Binary Files
45 25. Lecture 2 - PDF and SWF
46 26. Lecture 3 - Office Files
47 27. Lecture 4 - .NET Programs
48 28. Lecture 5 - Shellcode Analysis
5 Elementary Malware Analysis
49 29. Lecture 1 - Chapter 5 - Malware Analysis
50 30. Lecture 2 - Introduction
51 31. Lecture 3 - The Three-Step Method
52 32. Lecture 4 - Malware Analysis Tools
53 33. Lecture 5 - Step 1 - Online Tools
54 34. Lecture 6 - Step 1 - Online Tools (Demo)
55 35. Lecture 7 - Step 2 - Static Analysis
56 36. Lecture 8 - Step 2 - Static Analysis (Demo)
57 37. Lecture 9 - Step 3 - Dynamic Analysis
58 38. Lecture 10 - Step 3 - Dynamic Analysis (Demo)

Reviews

No reviews available yet.