* Cantinho Satkeys

Refresh History
  • FELISCUNHA: Votos de um santo domingo para todo o auditório  4tj97u<z
    03 de Novembro de 2024, 10:49
  • j.s.: bom fim de semana  43e5r6 49E09B4F
    02 de Novembro de 2024, 08:37
  • j.s.: ghyt74 a todos  4tj97u<z
    02 de Novembro de 2024, 08:36
  • FELISCUNHA: ghyt74   49E09B4F  e bom feriado   4tj97u<z
    01 de Novembro de 2024, 10:39
  • JPratas: try65hytr Pessoal  h7ft6l k7y8j0
    01 de Novembro de 2024, 03:51
  • j.s.: try65hytr a todos  4tj97u<z
    30 de Outubro de 2024, 21:00
  • JPratas: dgtgtr Pessoal  4tj97u<z k7y8j0
    28 de Outubro de 2024, 17:35
  • FELISCUNHA: Votos de um santo domingo para todo o auditório  k8h9m
    27 de Outubro de 2024, 11:21
  • j.s.: bom fim de semana   49E09B4F 49E09B4F
    26 de Outubro de 2024, 17:06
  • j.s.: dgtgtr a todos  4tj97u<z
    26 de Outubro de 2024, 17:06
  • FELISCUNHA: ghyt74   49E09B4F  e bom fim de semana
    26 de Outubro de 2024, 11:49
  • JPratas: try65hytr Pessoal  101yd91 k7y8j0
    25 de Outubro de 2024, 03:53
  • JPratas: dgtgtr A Todos  4tj97u<z 2dgh8i k7y8j0
    23 de Outubro de 2024, 16:31
  • FELISCUNHA: ghyt74  pessoal   49E09B4F
    23 de Outubro de 2024, 10:59
  • j.s.: dgtgtr a todos  4tj97u<z
    22 de Outubro de 2024, 18:16
  • j.s.: dgtgtr a todos  4tj97u<z
    20 de Outubro de 2024, 15:04
  • FELISCUNHA: Votos de um santo domingo para todo o auditório  101041
    20 de Outubro de 2024, 11:37
  • axlpoa: hi
    19 de Outubro de 2024, 22:24
  • FELISCUNHA: ghyt74   49E09B4F  e bom fim de semana  4tj97u<z
    19 de Outubro de 2024, 11:31
  • j.s.: ghyt74 a todos  4tj97u<z
    18 de Outubro de 2024, 09:33

Autor Tópico: Reverse Engineering & Memory Hacking of Packed Programs  (Lida 95 vezes)

0 Membros e 1 Visitante estão a ver este tópico.

Online mitsumi

  • Moderador Global
  • ***
  • Mensagens: 115675
  • Karma: +0/-0
Reverse Engineering & Memory Hacking of Packed Programs
« em: 30 de Março de 2021, 10:57 »

MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 15 lectures (1h 44m) | Size: 1.31 GB
Learn how to reverse, debug and patch packed programs - without unpacking - by using Cheat Engine

What you'll learn:
Bypass anti-debuggers
Patch Memory
Use x64dbg debugger
Using Cheat Engine
Using ScyllaHide Plugin
Using SharpOD Plugin
Using built-in hide Debugger functionality
Using Trainers (Loaders) for Process Patching
AOB Code Injection
Direct Byte Patching
ASM scripting for app hacking
LUA scripting for memory hacking
Designing Trainers (Loaders) with CE's Form Designer
Break and Trace
Modify program behaviour
Packing and Disassembling Crackmes using Popular Packers
and more...

Requirements
Assembly language is helpful but not compulsory
Windows PC
Already know how to use x64dbg debugger
Familiar with Cheat Engine

Description
If you had always wanted to learn how to reverse and patch packed programs - without unpacking, then this is the course for you. This course is a follow-up from the earlier course on Reverse Engineering & Memory Hacking. It is the practical application of what you have learnt in the first course. If you think that packing and anti-debugging is good enough to prevent reverse engineering, then you may be in for a surprise. In this course, I will show you how to test the effectiveness of several popular packers by packing crackmes and then reversing them - without unpacking.

Traditionally packed programs are unpacked before debugging is carried out. This is because a packed program's file cannot be patched. Much of software protection has centered on making it difficult to unpack programs. However, the important question is: how effective is packing, obfuscation and anti-debugging as a means to prevent reversing? This course explores several packers to find the answers.

We will do the analysis using a tool called Cheat Engine, which is a prominent tool used by game hackers. This tool could also be used to study and analyze packed program's processes that is running in memory. You will learn how to perform debugging in spite of anti-debugging being implemented. There is no need to unpack and dump memory. Instead of unpacking and then patching the dumped files and fixing IAT (Import Address Table) tables, we will write scripts to hack memory using byte patching using an advanced technique called AOB (Array-Of-Bytes) Injection, by injecting code into code caves (inline memory patching). In this course you will learn how to do all of the above and more.

At the end of this course you will be able to gauge the effectiveness of software packers, obfuscation and anti-debugging protection and also to have a good idea of how to implement extra countermeasures to improve the security of software.

In all the practical exercises and walkthroughs, we will use Crackme's which I have written. You will learn how to pack them using several popular packers and then hack them using Cheat Engine.

What you will learn

How to set hardware breakpoints and debug packed programs in spite of anti-debugging protection

Doing Break and Trace to identify Algorithms for reversing

Identifying addresses to do memory patching

Writing custom trainers (loaders) using Cheat Engine to hack and patch memory

Modify program behavior

Process Patching programs

Creating Lua Scripts for process patching

Test the effectiveness of Anti-Debugging technology

Packing crackmes using popular packers

Hack the packed crackmes and patch their memory during runtime

Prerequisites:

Before taking this course, you should preferably be already familiar with how to use x64dbg and Cheat Engine

Windows PC

Some knowledge of Assembly would be useful but not compulsory

Who this course is for
Anyone who wants to know how to assess the effectiveness of packers against Reverse Engineering
Software Developers who want to implement extra layer of protection in addition to packing and Anti-debugging
Reversing hobbyist who wants to level up their skills to take on packed software
An introduction to Software Protection for anyone who wants to get started in this field


Download link:
Só visivel para registados e com resposta ao tópico.

Only visible to registered and with a reply to the topic.

Links are Interchangeable - No Password - Single Extraction