Udemy

Reverse Engineering: IDA For Beginners

立即報名
  • 25,211 名學生
  • 更新於 1/2026
4.6
(325 個評分)
CTgoodjobs 嚴選優質課程,為職場人士提升競爭力。透過本站連結購買Udemy課程,本站將獲得推廣佣金,有助未來提供更多實用進修課程資訊給讀者。

課程資料

報名日期
全年招生
課程級別
學習模式
修業期
3 小時 25 分鐘
教學語言
英語
授課導師
Paul Chin, PhD
評分
4.6
(325 個評分)
5次瀏覽

課程簡介

Reverse Engineering: IDA For Beginners

Learn to use IDA Pro Free to do Reverse Engineering on Linux and Windows

If you are a beginner to Reverse Engineering and want to learn how to use IDA Pro to reverse engineer and analyze Linux and Windows programs, then this is the course for you. In this course, you will a CTF (Capture The Flag) game -for Linux whilst learning reverse engineering. This makes learning fun and exciting. This will teach you all the basic skills for reversing on IDA, eg, how to rename labels, insert comments, convert data, create functions and analyze assembly code. We will use the Free version of IDA so that anyone can follow along without spending money to buy the Pro version. After that we will move to Windows and Reverse Engineer five Windows Crackme's.

IDA Pro is one of the most widely used Disassembler for Reverse Engineering, Malware Analysis and Exploits analysis. In this course we will learn IDA by solving Linux and windows CrackMe. A CrackMe is a small program designed to test a programmer's reverse engineering skills. This course is an introduction to Reverse Engineering for anyone who wants to get started in this field. It is suitable for software developers who want to learn how software works internally. This course will equip you with the knowledge and skill to use IDA in addition to whatever other tools you might already be familiar with. It is also suitable for absolute beginners with no knowledge of reversing, as I will take you from zero to basics.

I will start off with showing you how to install Oracle Virtual Box. Then, installing Remnux Linux in the Virtual Box followed by IDA for Linux. Then, we will reverse engineer Linux executable files. In a later section, we will move to installing IDA on Windows and continue learning how to reverse engineer windows files using IDA.

By the end of this course, you will have the basic skills to start reversing and analyzing Linux and Windows binaries using IDA.

What you will learn:

  • How to disassemble programs into assembly code

  • How to decompile programs to C code

  • Static Analysis

  • Dynamic Analysis using IDA's Debugger

  • Patch files using IDA

  • Understand Linux and Windows API's

  • Identify entry points and functions

  • Using NOPs and Reversing Jumps

  • Reverse Crackmes and Patch them

  • Learn to Assemble Instructions and Patch Bytes

  • Algorithm Analysis and Testing

  • Using Python to create solutions and keygens to crackmes

  • and more

Suitable for:

  • Anyone interested to learn to use IDA for Reverse Engineering Linux and Windows executable files.

  • Students thinking of getting into Reverse Engineering or Malware Analysis as a Career Path


Prerequisite:

  • Assembly Language, C Programming and Python would be helpful

  • Windows PC

  • Basic Linux Commands

課程章節

  • 14 個章節
  • 29 堂課
  • 第 1 章 Introduction
  • 第 2 章 Installing IDA for Linux
  • 第 3 章 Assembly Language Basics
  • 第 4 章 Basic File Analysis and IDA Usage
  • 第 5 章 Debugging, Patching, Decompiling and Creating Structs Using IDA
  • 第 6 章 Basic Skills: Level 1
  • 第 7 章 Basic Skills: Level 2
  • 第 8 章 Installing IDA for Windows
  • 第 9 章 How to debug and patch a crackme on Windows
  • 第 10 章 Static Analysis of Windows Crackme2
  • 第 11 章 Reversing Jumps and NOPs - Crackme3
  • 第 12 章 Modifying Trial Expiry - Crackme4
  • 第 13 章 Intermodular Calls, Algorithm Analysis and Python Keygen - crackme5
  • 第 14 章 Resources For Further Study

課程內容

  • Reverse Engineering, Assembly Language, Remnux Linux IDA, Windows IDA, File, Strings and Hexeditor Analysis, Converting Data, Renaming Labels and Variables, Inserting Comments, Creating Data Structures, Decompiling Binary to C code, Debugging using IDA, Patching Files, Register and Memory Analysis, Python Scripting For Reversing Algorithms, Creating Keygens, Cracking Windows Crackmes, Reversing Jumps, Using NOPs to disable instructions, Extending Trial Period beyond 30 days, Intermodular Call Method, Dynamic Analysis to Confirm Algorithms, Linux and Windows API, Algorithm Analysis and Testing, Creating Keygens, Setting breakpoints and stepping through code, and more


評價

  • M
    Marlon Cabrera
    4.5

    All okay!

  • P
    Prakhar Chaturvedi
    1.0

    things are not connected properly

  • M
    Matthew
    5.0

    I loved taking this course as I learned invaluable skills and knowledge. Through this course, I learned how to effectively use the IDA software tool, gained a better understanding of reverse engineering processes with IDA, and acquired basic knowledge of assembly language. The course was informative, making it a truly enriching learning experience.

  • D
    Dominik Padych
    5.0

    For me this was worth the time (can't talk about money, because it's free for me as part of the company education system). I've taken the assembly course as well and both of them are great. Everything is taught in easy to understand way, followed by examples/explanation of why the things work the way they work. I'll definitely have a go at Paul's crackinglessons.com courses at some point in the future even though I'll have to pay for it myself.

立即關注瀏覽更多

本網站使用Cookies來改善您的瀏覽體驗,請確定您同意及接受我們的私隱政策使用條款才繼續瀏覽。

我已閱讀及同意