Register Account


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Assembly Language Programming for Reverse Engineering
#1
[Image: 5053884-aac8.jpg]
Last updated 7/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Language: English | Duration: 12h 29m | Size: 8.8 GB

Understand assembly code and modify exe files to add new functionality using x64dbg

[b]What you'll learn[/b]
Assembly Language Basics
Reverse Engineering
xdbg debugging basics
Modifying programs
Injecting code into exe files
Hollowing out an exe file
CPU registers
Basic Addition
INC, DEC, MUL and DIV instructions
Accessing main memory (RAM)
The Stack
Function Calls
Input and Output Functions
Code Caves
Functions that returns a value
The Flags Register
Jumps
Compare Instructions
Structured Programming
Signed Operations
and more . . .

[b]Requirements[/b]
PC
Basic C programming knowledge would be helpful but not necessary
You will learn everything you need to know

[b]Description[/b]
If you have been using debuggers to reverse engineer programs but wished you had more understanding of Assembly Language, then this course is for you. We will cover enough assembly language to allow you to understand how to modify exe files to insert your own code or, to modify existing exe files to do things which it was not intended to do.
Traditionally, assembly language programming is taught using an assemblers like NASM or FASM. But learning it that way will not give you the skills to understand reverse engineered programs. There is a missing link (knowledge gap) of how to apply your assembly knowledge to modify programs. This course fills that knowledge gap.
Instead of using an assembler, we will directly use the x64dbg debugger to learn assembly language. That is right, we will write our own assembly code inside the x64dbg debugger itself. You will learn Assembly Language from the ground up with zero knowledge as a complete beginner.
We will use techniques that allow you to
modify existing code
overwrite existing code
modify memory segments to insert data
create new functions
exploit code caves
add new functionality to existing programs
and more...
This black art is not widely taught and there are no existing courses elsewhere that puts together coherently all the knowledge of assembly and reverse engineering. Mostly what you will find are separate courses on Assembly and Reverse Engineering. Many courses on Reverse Engineering don't cover the background assembly language from a software hacker's perspective. And almost all Assembly Language courses teach you how to write programs from scratch, instead of how to modify existing programs to add new functionality with your own code using a debugger like x64dbg.
The knowledge you gain will be your added advantage either as a security researcher, or, malware analyst, or student of software security. It will also benefit programmers who want to know how programs run internally and how to extend program functionality if you do not have the source code.
Go ahead and enroll now and I will see you inside!

Who this course is for
Security researchers and students
Reverse Engineers
Anyone interested to learn Assembly Language from a software hacker's perspective

Homepage

[To see links please register or login]


Download From Rapidgator

[To see links please register or login]


Download From Nitroflare

[To see links please register or login]

[Image: signature.png]
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Download Now   Download Now
Download Now   Download Now