Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Reverse Engineering and Software Protection
Training Overview
Description of Training
Video Overview (3:02)
Section 1: Introduction
1. Introduction (3:02)
Section 2: Introduction to Software
2. Introduction to Software Protection (9:12)
Section 3: Downloading CrackMe 11
3. Downloading CrackMe 11 (7:04)
Section 4: Examining the packer protection
4. Examining the packer protection (7:17)
Section 5: Unpacking the packed program
5. Unpacking (7:56)
Section 6: Patching the dumped file
6. Patching the dumped file (4:26)
Section 7: Introduction to Loaders
7. Introduction to Loaders (3:56)
Section 8: Creating a Loader
8. Creating a Loader (9:30)
Section 9: Introduction to Anti-Debugging Protection
9. Introduction to Anti-Debugging Protection (2:40)
Section 10: Downloading CrackMe 12
10. Downloading CrackMe 12 (4:33)
Section 11: Patching Anti-Debugging API calls
11. Patching Anti-Debugging API calls (9:02)
Section 12: Installing the Scylla Hide plugin for anti-anti-debugging
12. Installing the Scylla Hide plugin for anti-anti-debugging (9:15)
Section 13: Using ScyllaHide to hide the debugger
13. Using ScyllaHide to hide the debugger (6:20)
Section 14: Introduction to multiple software protection
14. Introduction to multiple software protection (2:39)
Section 15: 3 ways to reverse engineer multiple protections
15. 3 ways to reverse engineer multiple protections (4:10)
Section 16: Technique #1: Hiding debugger and using loader for process patching
16. Technique #1: Hiding debugger and using loader for process patching (12:31)
Section 17: Technique #2: Hiding debugger, unpack then patch
17. Technique #2: Hiding debugger, unpack then patch (10:56)
Section 18: Technique #3: Hiding debugger, then do Serial Phising
18. Technique #3: Hiding debugger, then do Serial Phising (16:18)
Section 19: Resources for Further Study
19. Bonus Lecture
7. Introduction to Loaders
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock