Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

Reverse Engineering 3: x64dbg Graphical Static Analysis

Posted By: lucky_aut
Reverse Engineering 3: x64dbg Graphical Static Analysis

Reverse Engineering 3: x64dbg Graphical Static Analysis
Last updated 11/2022
Duration: 1h 35m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 800 MB
Genre: eLearning | Language: English

Introduction to using x64dbg to reverse engineer programs using graphical static analysis

What you'll learn
Use x64dbg to do static analysis
Graphical analysis of code
Reverse engineer software
Debug and fix errors in programs
Patch programs
Mod software
View code in graphical form like flowchart
Requirements
Windows PC
Interest to solve crackme challenges
Background in Assembly and C Programming would be helpful but not compulsory
Description
If you had always wanted to learn how to
reverse engineer
a program and understand how it works from the inside out, then this is the course for you. Except for IDA Pro, many other debuggers out there are not capable of performing graphical representation of a disassembled software. x64dbg however can do it. It can disassemble a program and also represent it as a graphical representation. This makes it ideal as a free tool to perform what IDA Pro can do - i.e. static analysis.
Unfortunately, there is not much information on the Internet on how to use x64dbg to do static analysis, hence this course. You can use its powerful graphical tool for
Reverse Engineering, Malware Analysis and Software Debugging
. In this course we will learn how to disassemble a program and represent it an a graphical view so as to be able to easily analyse and understand how the program works - and also to patch programs. The hidden power of x64dbg lies in its ability to run a
live debugging session simultaneously with graphical static analysis
. And I will show you how to do it in this course.
What you will learn:
How to disassemble programs into assembly code and show it in a graphical representation
Graphical Static Analysis
Setting breakpoints and stepping through code
Modify program behaviour
Reversing jumps
Changing register values
Patching programs
Money back guarantee:
This course is backed by a
30-day money back guarantee
. So, go ahead and enroll in this course now and start reverse engineering programs the fun and easy way using graphical static analysis!
Who this course is for:
Programmers who want to learn how to debug software using x64dbg
Computing students interested to learn how software works from the inside
Anyone interested in learning reverse engineering
Reversers who want to learn how to use the graphical tool in x64dbg

More Info