Reverse Engineering

Breaking Software Protection and Decrypting

3h 25m15 lectures2 sections

What you'll learn

  • Understand reverse engineering basics
  • Identify software cracking tools
  • Decrypt using various techniques
  • Use password guessing techniques
  • Analyze protected applications
  • Apply steps to bypass protection

About this course

Reverse engineering is used in various fields, such as analyzing computer programs, encryption systems, electronic devices, and mechanical components. It is primarily used to understand how things work and analyze them, allowing for necessary modifications or creating new copies. In this course, we will explore reverse engineering in relation to software, where it can be used to examine hidden, encrypted, or protected code and understand it, enabling modifications or breaking existing protections. This will be achieved through a wide range of tools and programs that we will learn to use in detail.

Expected outcomes

  • Understand how to break software protections and identify security vulnerabilities.
  • Acquire skills to use reverse engineering tools effectively.
  • Execute Brute Forcing attacks professionally.
  • Decrypt software and applications using advanced techniques.
  • Enhance your capabilities as a professional in reverse engineering.

Course content

1

Reverse Engineering - Breaking Software Protection and Decrypting

14 lectures
  1. Introduction to Reverse Engineering (Applications and Advantages)7:23
  2. Number Systems and Their Uses in Application Cracking15:34
  3. The Processor, Addressing, and Stacks in Computers16:07
  4. Introduction to Assembly Language14:12
  5. Overview of Reverse Engineering and Installing OllyDBG and Its Plugins20:42
  6. Complete Explanation of OllyDBG and PEID for Protection Detection8:56
  7. Explaining Serial Fishing and a Practical Introduction to Reverse Engineering14:51
  8. How to Patch Protected Applications13:19
  9. Explaining Code Injection Inside the Victim Program19:03
  10. Explaining RSA Code Inside CRYPTOGRAPHY21:34
  11. Explaining Key File Protection and Reviewing Important Functions16:30
  12. Guessing Passwords of Protected Files Using Brute Forcing18:09
  13. Cracking .NET and Visual Basic Applications11:23
  14. Introduction to the Largest Arab Gathering of Reverse Engineering Professionals7:41
2

Add-ons

1 attachments
  1. Downloading Examples and Used Programs

Instructor

Eng. Kanaan Al-Hallaj

Eng. Kanaan Al-Hallaj

Instructor at the International Robotics Club, specializing in the development and programming of customer relationship management applications, has worked on various projects integrating robotics and artificial intelligence.
6,905 students14 courses

Related courses

  • CCNA Cisco Network
    4.6|5,045|5h 57m

    CCNA Cisco Network

    Network Installation and Management Skills

    Eng. Ahmed Haykal
    Eng. Ahmed Haykal
    $19.99
    Buy now
  • Linux Operating Systems
    4.7|4,954|14h 25m

    Linux Operating Systems

    Learn and Master Linux Operating Skills

    Eng. Ahmed Haykal
    Eng. Ahmed Haykal
    $19.99
    Buy now
  • Cyber Security Fundamentals
    4.9|5,485|13h 6m

    Cyber Security Fundamentals

    Comprehensive Professional Course in Information Security

    Eng. Moamen Mohamed
    Eng. Moamen Mohamed
    $19.99
    Buy now
  • WiFi Hacking and Security
    4.9|5,234|3h 44m

    WiFi Hacking and Security

    Master Network Vulnerability Discovery

    Eng. Kanaan Al-Hallaj
    Eng. Kanaan Al-Hallaj
    $19.99
    Buy now