Reverse Engineering Memory Hacking and Software Protection faq

learnersLearners: 32,709
instructor Instructor: Paul Chin instructor-icon
duration Duration: instructor-icon

This course is perfect for anyone who has always wanted to learn how to reverse and patch packed programs without unpacking. In this course, you will learn how to test the effectiveness of several popular packers by packing crackmes and then reversing them without unpacking. You will also learn how to debug packed programs in spite of anti-debugging protection, write custom trainers, modify program behavior, and create Lua scripts for process patching. By the end of this course, you will be able to gauge the effectiveness of software packers, obfuscation and anti-debugging protection and also have a good idea of how to implement extra countermeasures to improve the security of software.

Course Feature Course Overview Pros & Cons Course Provider
Go to class

Course Feature

costCost:

Paid

providerProvider:

Udemy

certificateCertificate:

Paid Certification

languageLanguage:

English

start dateStart Date:

2022-11-07

Course Overview

❗The content presented here is sourced directly from Udemy platform. For comprehensive course details, including enrollment information, simply click on the 'Go to class' link on our website.

Updated in [July 17th, 2023]

This course, Reverse Engineering Memory Hacking and Software Protection, is designed to teach students how to reverse and patch packed programs without unpacking them. It is a follow-up from the earlier course on Reverse Engineering & Memory Hacking and is the practical application of what was learnt in the first course. Students will learn how to test the effectiveness of several popular packers by packing crackmes and then reversing them without unpacking. They will also learn how to debug packed programs in spite of anti-debugging being implemented, as well as how to do break and trace to identify algorithms for reversing, identify addresses to do memory patching, write custom trainers (loaders) using Cheat Engine to hack and patch memory, modify program behavior, process patching programs, create Lua scripts for process patching, and test the effectiveness of anti-debugging technology. Prerequisites for this course include familiarity with x64dbg and Cheat Engine, a Windows PC, and some knowledge of Assembly (though this is not compulsory).

Pros & Cons

Pros Cons
  • pros

    Valuable information: Users appreciate that the instructor, Paul, provides valuable information throughout the course. They feel that they have learned interesting things and find the techniques shown in the course clever and easy to execute.

  • pros

    Instructor's care and clarity: Users commend Paul for his care towards the students and his ability to explain things clearly. They mention that his courses are suitable for newbies as he takes the trouble to ensure that everyone can follow along.

  • cons

    Repetition: Some users feel that towards the end of the course, there is repetition, particularly when it comes to building custom memory hackers. They believe that the course could have been more valuable if it delved deeper into the subject matter.

  • cons

    Lack of variety: A few users mention that the bypasses for each packer in the course felt too similar. They note that there wasn't anything really new in each lesson, except for using different packers. They would have liked to see more diversity in the content.

Course Provider

Provider Udemy's Stats at OeClass