Explanation
Reverse Engineering 2: Windows GUI Programs In the first course in this series titled Reverse Engineering 1: x64dbg Debugger for Beginners, you learned how to reverse engineer a program from the command line and learned how to debug, step and debug and more. Now, in this 2nd course, you will continue learning. This time we will learn how to convert engineering graphics interface programs. As usual, I will work with the crackme’s that I wrote for you to learn the reverse.
What will you learn?
- Separate windows programs
- Jumping back
- Posting
- Windows programming error
- Crackme’s solution
- indicate no
- Modify the values of the EAX register
- Setting Up Tool Points
- Memory control
- Procedure for Calling the Intermediary
- Call the Connection method
- Understand how the Trial Period works
- Understand how the Software Registration process works
- Remove Nag Screens
Who is this course for?
- Computing students who want to learn how to disassemble and uninstall Windows programs
- Anyone interested in alternative engineering
- Programmers who want to know how to fix bugs in programs without the source code
Reverse engineering spec 2: GUI programming for Windows
- Publisher: Udemy
- Teacher: Paul Chin
- Language : English
- Level: Medium
- Number of courses: 40
- Duration: 4 hours and 5 minutes
Background Engineering Content 2: GUI Programming for Windows
Requirements
- Preferred to have completed Background Engineering 1: x64dbg Debugger for beginners, or already know how to use x64dbg
- Windows PC
Pictures
Sample Clip
Installation Guide
Extract files and watch your favorite player
Subtitle : English
Quality: 720p
Download Links
Password file: free download software
file size
2.41 GB