Introduction to Reverse Engineering

Reverse Engineering is a technique which man use to find and fix bug and improve the function of a programm. Learning this technique will help us to understand more and more about the operating system.
These are my tuts but they were written in Vietnamese.

  • Bài 1 : Hướng dẫn sử dụng OllyDebug I. Download
  • Bài 2 : Hướng dẫn sử dụng OllyDebug II. Download
  • Bài 3 : Thực tập với CrackMe . Download

Nowaday there is a popular series of tut for newbie which written by Lena151. According to me newbie should begin with this series. I’m sure that when you understand all of tuts in this series, your technique must be at least as same as admin REA’s. The tuts are in format of video. Very easy to understand.

Thank you ilit, P.E Onimusha for your work in translating these tut in Vietnamese.

01Olly + assembler + patching a basic reverseme or
Bản dịch Part 01 của ilit :
02Keyfiling the reverseme + assembler or
Bản dịch Part 02 của ilit :
03Basic nag removal + header problems or
04Basic + aesthetic patching or

Bản dịch Part 04 của P.E Onimusha:
05Comparing on changes in cond jumps, animate over/in, breakpoints or
06"The plain stupid patching method", searching for textstrings or
07Intermediate level patching, Kanal in PEiD or

Bản dịch Part 07 của P.E Onimusha:
08Debugging with W32Dasm, RVA, VA and offset, using LordPE as a hexeditor or

Bản dịch Part 08 của P.E Onimusha:
09Explaining the Visual Basic concept, introduction to SmartCheck and configuration or

Bản dịch Part 09 của P.E Onimusha:
10Continued reversing techniques in VB, use of decompilers and a basic anti-anti-trick or

Bản dịch Part 10 của P.E Onimusha:
11Intermediate patching using Olly's "pane window" or
12Guiding a program by multiple patching. or
13The use of API's in software, avoiding doublechecking tricks or
14More difficult schemes and an introduction to inline patching or
15How to study behaviour in the code, continued inlining using a pointer or
16Reversing using resources or
17Insights and practice in basic (self)keygenning or
18Diversion code, encryption/decryption, selfmodifying code and polymorphism or
19Debugger detected and anti-anti-techniques or
20Packers and protectors : an introduction or
21Imports rebuilding or
22API Redirection or
23Stolen bytes or
24Patching at runtime using loaders or
25Continued patching at runtime & unpacking armadillo standard protection or
26Machine specific loaders, unpacking & debugging armadillo or
27tElock + advanced patching or
28Bypassing & killing server checks or
29Killing & inlining a more difficult server check or
30SFX, Run Trace & more advanced string searching or
31Delphi in Olly & DeDe or
32Author tricks, HIEW & approaches in inline patching or
33The FPU, integrity checks & loader versus patcher or
34Reversing techniques in packed soft & A S&R loader for aspr or
35Inlining inside polymorphic code or
36Keygenning or
37An indept unpacking & anti-anti-debugging in a combined packer/protector or
38Unpacking continued & debugger detection by DLL's and TLS or
39Inlining a blowfish scheme in a packed & CRC protected dll + unpacking Asprotect SKE 2.2 or
40Obfuscation & Algo Hiding or

If these links shouldn’t work, try one of these : (tuts4you) (SnD Filez) (cgame at fixdown)

2 thoughts on “Introduction to Reverse Engineering”

  1. Bài viết của anh rất hay và dễ hiểu, nhưng em ko thấy file crackme8.2 đính kèm đâu cả, anh share lại đc ko?

Leave a Reply

Your email address will not be published. Required fields are marked *