
Reverse Engineering
Breaking Software Protection and Decrypting
3h 25m15 lectures2 sections
What you'll learn
- Understand reverse engineering basics
- Identify software cracking tools
- Decrypt using various techniques
- Use password guessing techniques
- Analyze protected applications
- Apply steps to bypass protection
About this course
Reverse engineering is used in various fields, such as analyzing computer programs, encryption systems, electronic devices, and mechanical components. It is primarily used to understand how things work and analyze them, allowing for necessary modifications or creating new copies. In this course, we will explore reverse engineering in relation to software, where it can be used to examine hidden, encrypted, or protected code and understand it, enabling modifications or breaking existing protections. This will be achieved through a wide range of tools and programs that we will learn to use in detail.
Expected outcomes
- Understand how to break software protections and identify security vulnerabilities.
- Acquire skills to use reverse engineering tools effectively.
- Execute Brute Forcing attacks professionally.
- Decrypt software and applications using advanced techniques.
- Enhance your capabilities as a professional in reverse engineering.
Course content
1Reverse Engineering - Breaking Software Protection and Decrypting
14 lectures
- Introduction to Reverse Engineering (Applications and Advantages)7:23
- Number Systems and Their Uses in Application Cracking15:34
- The Processor, Addressing, and Stacks in Computers16:07
- Introduction to Assembly Language14:12
- Overview of Reverse Engineering and Installing OllyDBG and Its Plugins20:42
- Complete Explanation of OllyDBG and PEID for Protection Detection8:56
- Explaining Serial Fishing and a Practical Introduction to Reverse Engineering14:51
- How to Patch Protected Applications13:19
- Explaining Code Injection Inside the Victim Program19:03
- Explaining RSA Code Inside CRYPTOGRAPHY21:34
- Explaining Key File Protection and Reviewing Important Functions16:30
- Guessing Passwords of Protected Files Using Brute Forcing18:09
- Cracking .NET and Visual Basic Applications11:23
- Introduction to the Largest Arab Gathering of Reverse Engineering Professionals7:41
2Add-ons
1 attachments
- Downloading Examples and Used Programs
Instructor

Eng. Kanaan Al-Hallaj
6,905 students14 courses





