Welcome to "x64dbg Scripting For Reverse Engineering and Memory Hacking." This comprehensive course is designed for both new and experienced students in the field of ethical hacking and reverse engineering. Whether you've taken my previous x64dbg courses or are familiar with the basics of reverse engineering, this course will take your skills to the next level by diving deep into the power of xdbg scripting.
Welcome to "x64dbg Scripting For Reverse Engineering and Memory Hacking." This comprehensive course is designed for both new and experienced students in the field of ethical hacking and reverse engineering. Whether you've taken my previous x64dbg courses or are familiar with the basics of reverse engineering, this course will take your skills to the next level by diving deep into the power of xdbg scripting.
In this course, you'll learn how to automate reverse engineering tasks using x64dbg scripting, a critical skill for any serious security researcher. We'll start with the fundamentals of scripting within x64dbg and gradually move on to more advanced topics, such as modifying process memory to alter control flow logic, patching memory without the need to unpack executables, and test complex packing protections and anti-tampering mechanisms.
The course is structured to provide you with hands-on experience through real-world scenarios and challenges, allowing you to apply what you've learned in a practical, problem-solving context. If you're someone who enjoys solving puzzles and facing challenges head-on, this course will provide you with the tools and knowledge to do just that.
By the end of this course, you'll have the skills to automate and enhance your reverse engineering process, making you more efficient and effective in your work. Whether you're a security researcher looking to sharpen your skills or someone passionate about ethical hacking, this course is for you.
Join me in "x64dbg Scripting For Reverse Engineering and Memory Hacking" and start mastering the art of scripting in x64dbg today.
Sign up today and I will see you inside.
Introduction and Welcome to the course.
Installing Oracle Virtual Box and Windows Virtual Machine, x64dbg and DiE (Detect It Easy)
Understand the need and benefits for script programming
The power of scripting to defeat ASLR protection
Installing Visual Studio Code, configuring syntax highlighting, and Writing Your First Hello World Script
Create a Crackmes Project folder
Basic Introductory skills and knowledge
Where to go for help and documentation and how to use x64dbg's command input box
This tests your knowledge on x64dbg documentation and x64dbg Command Input Box
Use the MOV, INC, SUB, ADD, SUB and XOR instructions in a script
Use scripting to push registers to the stack and to pop the stack back to registers, understand significance of the order of pushes and pops.
Using the TEST instruction to do branching with JE and JNE instruction
Use the CMP instruction in scripting along with JE, JG and JL to branch
Init and attach to processes
run and serun and the differences between them
Stepping over code using sto command
Simple single step into without parameters
Perform recursive Step Into
Ignore exceptions when stepping over or stepping into code
Run to RET for every function.
Skip instructions using the skip command
Undo instructions using the command InstrUndo
Understand User Modules and System Modules, Set BP on API calls and Run to User Code
Understand User and System Modules, Step Until System Call. Use Loops.
Get Base Address dynamically and do AOB scans.
AoB Scan followed by patching a jump with NOPs
Search For Strings On The Stack
Search For Strings In the Registers. Useful for tracing where the password is about to be checked for either the correct length or to be compared with the real password.
Enable a disabled button by tracing breakpoint counts, then manually modify the SetWindowLong parameters.
Enable a disabled button by patching the SetWindowLong parameters using scripts
Modify MessageBox by Tracing Memory Where Parameters Originally Load
Modify MessageBox With Scripts and AoB Scans
Introduction to 04-Crypt0sBeginnerCrackMe - Preliminary Analysis
Trace Input Strings On The Stack and Understand The Differences Between ESP & EBP stack view
Tracing Password Input String On The Stack
Tracing Input Strings in Registers
Trace Input String on the Stack and Register
Patch Memory With NOPs to Reverse Jump Logic
Trace CMP instructions for comparison between Input and Actual Password
Patch memory with NOP to reverse a jump logic
GUI App Basic Input String Search
Handle-Proc Algorithm for Searching For Critical Functions
Two-in-one Patch for MessageBox and Reversing Jump
Understand that the Handle-Proc algorithm can be varied and also that not all buttons can be used to pause the debugger
Using Various Different Proc To Pause The Debugger and Also How to Search For Unicode (UTF-16) Input Strings.
Patch memory to change the serial key to your own
Introduction to Keygenthis and Handle-Proc algorithm
Create Keygen Where There Are No Error MessageBoxes
Preliminary Analysis of Trope crackme and trying Handle-Proc Algorithm on it
Use the Message Breakpoint Method to Locate the Critical Function
Fishing out the actual password by tracing the individual character comparison. Use the ZF flag to prevent early exit.
Set Breakpoint On GetDlgItemText API To Locate Critical Function
Understand Concept Behind The Message Breakpoint Method For Finding The Critical Function
Preliminary analysis on Patchme-Revamped
Avoiding Dynamic Bytes and Modifying EIP to Exit App
Identifying Dynamic Bytes In AOB and Replacing Them With Wildcard Placeholders
Understand the two-step input validation process
Understand x64 calling convention and parameter windows
Looking for a place to put bp in a packed program
Using VirtualProtect to locate unpacked region to insert breakpoint after input
Using scripts and AOB scans to set breakpoints in the unpacked region and to locate the Critical Region
Patching with NOPs to always show the Good Message
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.