- Joined
- Nov 19, 2023
- Messages
- 2,718
- Reaction score
- 25,300
- Points
- 113
- Thread Author
- #1
What is Reverse Engineering?
- Reverse engineering, also called back engineering, is the processes of extracting knowledge or design information from anything man-made and re-producing it or reproducing anything based on the extracted information. Thanks Wikipedia
So here we go:
Tutorials
What it contains?
- Olly + assembler + patching a basic reverseme
- Keyfiling the reverseme + assembler
- Basic nag removal + header problems
- Basic + aesthetic patching
- Comparing on changes in cond jumps, animate over/in, breakpoints
- “The plain stupid patching method”, searching for textstrings
- Intermediate level patching, Kanal in PEiD
- Debugging with W32Dasm, RVA, VA and offset, using LordPE as a hexeditor
- Explaining the Visual Basic concept, introduction to SmartCheck and configuration
- Continued reversing techniques in VB, use of decompilers and a basic anti-anti-trick
- Intermediate patching using Olly’s “pane window”
- Guiding a program by multiple patching.
- The use of API’s in software, avoiding doublechecking tricks
- More difficult schemes and an introduction to inline patching
- How to study behaviour in the code, continued inlining using a pointer
- Reversing using resources
- Insights and practice in basic (self)keygenning
- Diversion code, encryption/decryption, selfmodifying code and polymorphism
- Debugger detected and anti-anti-techniques
- Packers and protectors : an introduction
- Imports rebuilding
- API Redirection
- Stolen bytes
- Patching at runtime using loaders from lena151 original
- Continued patching at runtime & unpacking armadillo standard protection
- Machine specific loaders, unpacking & debugging armadillo
- tElock + advanced patching
- Bypassing & killing server checks
- Killing & inlining a more difficult server check
- SFX, Run Trace & more advanced string searching
- Delphi in Olly & DeDe
- Author tricks, HIEW & approaches in inline patching
- The FPU, integrity checks & loader versus patcher
- Reversing techniques in packed software & a S&R loader for ASProtect
- Inlining inside polymorphic code
- Keygenning <— (This one i liked the most)
- In-depth unpacking & anti-anti-debugging a combination packer / protector
- Unpacking continued & debugger detection by DLL’s and TLS
- Inlining a blowfish scheme in a packed & CRC protected dll
To see this hidden content, you must reply and react with one of the following reactions : Like, Love, Wow