Overview
Learn how software protection works from the inside out using the x64dbg debuggerWhat you'll learn:
- How to unpack programs
- Bypass anti-debuggers
- Patch programs
- Dump memory to files
- Use x64dbg debugger
- Use ScyllaHide plugin
- 3 ways to unpack layered protections
- What if the program cannot be unpacked
- Using loaders for process patching
- and more...
1. Introduction
2. Introduction to Software Protection
3. Downloading CrackMe 11
4. Examining the packer protection
5. Unpacking the packed program
6. Patching the dumped file
7. Introduction to Loaders
8. Creating a Loader
9. Introduction to Anti-Debugging Protection
10. Downloading CrackMe 12
11. Patching Anti-Debugging API calls
12. Installing the Scylla Hide plugin for anti-anti-debugging
13. Using ScyllaHide to hide the debugger
14. Introduction to multiple software protection
15. 3 ways to reverse engineer multiple protections
16. Technique #1 Hiding debugger and using loader for process patching
17. Technique #2 Hiding debugger, unpack then patch
18. Technique #3 Hiding debugger, then do Serial Phising
19. Resources for Further Study
