<< WIN Learn - Reverse Engineering -Lena151 (OllyDebugger)
Learn - Reverse Engineering -Lena151 (OllyDebugger)
Category Applications
PlatformWindows
GenreSystem software
GenreEducational
Date 2 months, 2 weeks
Size 3.34 GB
Spotted with Spotnet 2.0.0.284
 
Website Sponsor UsenetBucket
 
Sender Master67 (9KAOog)
Tag
Download    
 
Searchengine Search
NZB NZB
Sponsor
 
Number of spamreports 1

Post Description

WW=QzX8y5lYFM7rUId

Deze keer OllyDbg inplaats van X64DBG

Deze uitleg van Lena151 is in de 1e paar filmpjes vrij zwaar, komt veel informatie op je af.
Maar dan gaat ze/hij echt los en wordt het allemaal steeds duidelijker.
Als je op het einde alles zou weten ben je toch in een ver gevorded stadium.

Normaal zijn dit SWF files en die zijn omgezet aangezien Edge en dergelijken dit niet meer willen afspelen.

Inhoud van de filmpjes staat hieronder.

En aangezien er 1 liep te zeuren dat het onder Applicaties zou moeten en niet onder Movies, bijdeze dan.

!!!! Een kinderhand is gauw gevuld. !!!!

01. Olly + assembler + patching a basic reverseme
02. Keyfiling the reverseme + assembler
03. Basic nag removal + header problems
04. Basic + aesthetic patching
05. Comparing on changes in cond jumps, animate over/in, breakpoints
06. "The plain stupid patching method", searching for textstrings
07. Intermediate level patching, Kanal in PEiD
08. Debugging with W32Dasm, RVA, VA and offset, using LordPE as a hexeditor
09. Explaining the Visual Basic concept, introduction to SmartCheck and configuration
10. Continued reversing techniques in VB, use of decompilers and a basic anti-anti-trick
11. Intermediate patching using Olly's "pane window"
12. Guiding a program by multiple patching.
13. The use of API's in software, avoiding doublechecking tricks
14. More difficult schemes and an introduction to inline patching
15. How to study behaviour in the code, continued inlining using a pointer
16. Reversing using resources
17. Insights and practice in basic (self)keygenning
18. Diversion code, encryption/decryption, selfmodifying code and polymorphism
19. Debugger detected and anti-anti-techniques
20. Packers and protectors : an introduction
21. Imports rebuilding
22. API Redirection
23. Stolen bytes
24. Patching at runtime using loaders from lena151 original
25. Continued patching at runtime & unpacking armadillo standard protection
26. Machine specific loaders, unpacking & debugging armadillo
27. tElock + advanced patching
28. Bypassing & killing server checks
29. Killing & inlining a more difficult server check
30. SFX, Run Trace & more advanced string searching
31. Delphi in Olly & DeDe
32. Author tricks, HIEW & approaches in inline patching
33. The FPU, integrity checks & loader versus patcher
34. Reversing techniques in packed software & a S&R loader for ASProtect
35. Inlining inside polymorphic code
36. Keygenning
37. In-depth unpacking & anti-anti-debugging a combination packer / protector
38. Unpacking continued & debugger detection by DLL's and TLS
39. Inlining a blowfish scheme in a packed & CRC protected dll + unpacking Asprotect SKE 2.2
40. Obfuscation and algorithm hiding

WW=QzX8y5lYFM7rUId

Comments # 0