x64dbg Script Programming For Reverse Engineering
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 9h 58m | 7.14 GB
Instructor: Paul Chin, PhD
How to use xdbg scripting to automate reverse engineering, hack memory and test protection mechanisms
What you'll learn
- Script Programming
- Learn new reverse engineering techniques never taught before
- Practice and hone your assembly language hacking skills
- Hacking process memory
- Patch memory of packed program without unpacking
- Automating reverse engineering
- Debugging packed program without unpacking
- Evaluating, Analyzing and Testing UPX, VMProtect, Enigma and Themida Protectors
- Automation Using AutoIT
- Using AOB (Array of Bytes) Scan To Solve ASLR (Address Space Layout Randomization) Issues
- Finding Critical Regions By Tracing Input Strings In Memory
- Using Handle Proc Algorithm To Pause Debugger To Run Scripts
- Searching For Critical Regions Even Though There Are No Visible Strings
- Tracing Input Strings In The Stack and Parameter Windows To Find Critical Region
- Enabling disabled Buttons
- Modifying Message Boxes With Scripts and AOB Scans
- Using Instruction Pointers EIP and RIP To Modify Flow Control
- Two Step Input Validation and x64 Calling Conventions
- Automatic RTU (Run To User) To Speed Up Search For Critical Regions
- Creating Keygens via Scripting
- Patching Stack Parameters on The Fly
- and more . . .