So you want to be a Reverser? This is the best tutorial with the best tools ever coupled!!
What is Reverse Engineering?
- Reverse engineering, also called back engineering, is the processes of extracting knowledge or design information from anything man-made and re-producing it or reproducing anything based on the extracted information. Thanks Wikipedia
So here we go:
Tutorials
What it contains?
-
Olly + assembler + patching a basic reverseme
-
Keyfiling the reverseme + assembler
-
Basic nag removal + header problems
-
Basic + aesthetic patching
-
Comparing on changes in cond jumps, animate over/in, breakpoints
-
“The plain stupid patching method”, searching for textstrings
-
Intermediate level patching, Kanal in PEiD
-
Debugging with W32Dasm, RVA, VA and offset, using LordPE as a hexeditor
-
Explaining the Visual Basic concept, introduction to SmartCheck and configuration
-
Continued reversing techniques in VB, use of decompilers and a basic anti-anti-trick
-
Intermediate patching using Olly’s “pane window”
-
Guiding a program by multiple patching.
-
The use of API’s in software, avoiding doublechecking tricks
-
More difficult schemes and an introduction to inline patching
-
How to study behaviour in the code, continued inlining using a pointer
-
Reversing using resources
-
Insights and practice in basic (self)keygenning
-
Diversion code, encryption/decryption, selfmodifying code and polymorphism
-
Debugger detected and anti-anti-techniques
-
Packers and protectors : an introduction
-
Imports rebuilding
-
API Redirection
-
Stolen bytes
-
Patching at runtime using loaders from lena151 original
-
Continued patching at runtime & unpacking armadillo standard protection
-
Machine specific loaders, unpacking & debugging armadillo
-
tElock + advanced patching
-
Bypassing & killing server checks
-
Killing & inlining a more difficult server check
-
SFX, Run Trace & more advanced string searching
-
Delphi in Olly & DeDe
-
Author tricks, HIEW & approaches in inline patching
-
The FPU, integrity checks & loader versus patcher
-
Reversing techniques in packed software & a S&R loader for ASProtect
-
Inlining inside polymorphic code
-
Keygenning <— (This one i liked the most)
-
In-depth unpacking & anti-anti-debugging a combination packer / protector
-
Unpacking continued & debugger detection by DLL’s and TLS
-
Inlining a blowfish scheme in a packed & CRC protected dll
-
Tools
While I’m sure that some of these are outdated, it should at least give you a headstart (by pointing you in the right direction). That doesn’t mean, however, that they are ALL outdated.
Happy learning