Windows Instrumentation With Frida
Buy now
Learn more
Introduction
Introduction
Binary Ninja License & Course Materials
Environment Setup
API Instrumentation
Well-Known Tools
Lab 1: Evaluating ProcMon & APIMonitor
Frida API Tracing
Lab 2: Frida Trace
Lab 2: Lab Guide
Introducing Fermion
Introducing Fermion
Lab 3: Fermion
Lab 3: Lab Guide
Hooking to -> Change Application Behaviour
Changing Application Behaviour
Lab 4: Manipulating Message Boxes
Lab 4: Lab Guide
Hooking to -> Inspect Data
Inspecting Application Data
Lab 5: Shoulder Surfing Terminal Sessions
Lab 5: Lab Guide
Hooking to -> Hide Data
Hiding Application Data
Lab 6: Hooking the API
Lab 6: Lab Guide
Traversing In-Memory Data Structures
Lab 7: Pointer Arithmetic
Lab 7: Lab Guide
Abusing Data Parsers
Lab 8: Mischief Managed
Lab 8: Lab Guide
Lab 8: Quiz
Calling Native Functions
Calling Native functions
Lab 9: Going Native
Lab 9: Lab Guide
Case Study: Defeating Symantec 2FA
UX/UI Romance Story
Lab 10: A Window to the Heart
Lab 10: Lab Guide
API Automation
Lab 11: Automation
Lab 11: Lab Guide
Case Study: Antimalware Scan Interface (AMSI)
Antimalware Scan Interface (AMSI)
Lab 12: HAMSICONTEXT
Lab 12: Lab Guide
Binary Instrumentation With Stalker
Binary Instrumentation With Stalker
Lab 13: Stalker
Lab 13: Lab Guide
Case Study: Minesweeper
Finally something that matters, Minesweeper
Lab 14: Parsing Board State
Lab 14: Lab Guide
We must go deeper
Lab 15: Automation
Lab 15: Lab Guide
Case Study: DLL Side-Loading
DLL Side-Loading
Lab 16: LoadLibraryExW
Lab 16: Lab Guide
Unit Testing
Lab 17: In-Memory Unit Testing
Lab 17: Lab Guide
PwnAdventure3 Introduction
It's only Game -> PwnAdventure3
Lab 18: Jump Mechanics
Lab 18: Lab Guide
__thiscall Calling Convention
Lab 19: Accessing __thiscall Objects
Lab 19: Lab Guide
Implementing A "Cheat Engine"
Repurposing Application Functionality
Lab 20: Talk talk talk
Lab 20: Lab Guide
Symbol Analysis
Lab 21: Porting to our "Cheat Engine"
Lab 21: Lab Guide
Leveraging Native Game Functionality
Traveling Fast, Traveling Far
Lab 22: Teleportation
Lab 22: Lab Guide
What about p0wn?
Lab 23: Bears With Guns
Lab 23: Lab Guide
Alternate p0wnage -> I Take No Damage
Alternate p0wnage -> The Birds and the Bears
Bonus p0wnage -> Loot Goblin
Advanced Data Structures
PwnAdventure3 Server Setup
C++ Map Containers
Lab 24: Leaking the ClientWorld
Lab 24: Lab Guide
Traversing Red/Black Trees In Memory
Lab 25: Reading the ClientWorld
Lab 25: Lab Guide
Hooking Network Traffic
Overtrained, Overspecialized
Lab 26: Dumping Packets
Lab 26: Lab Guide
Implementing the Network Protocol
Lab 27: Parsing Packets
Lab 27: Lab Guide
Course Review
Course Review
Course Feedback
Products
Course
Section
Lesson
Lab 18: Lab Guide
Lab 18: Lab Guide
Windows Instrumentation With Frida
Buy now
Learn more
Introduction
Introduction
Binary Ninja License & Course Materials
Environment Setup
API Instrumentation
Well-Known Tools
Lab 1: Evaluating ProcMon & APIMonitor
Frida API Tracing
Lab 2: Frida Trace
Lab 2: Lab Guide
Introducing Fermion
Introducing Fermion
Lab 3: Fermion
Lab 3: Lab Guide
Hooking to -> Change Application Behaviour
Changing Application Behaviour
Lab 4: Manipulating Message Boxes
Lab 4: Lab Guide
Hooking to -> Inspect Data
Inspecting Application Data
Lab 5: Shoulder Surfing Terminal Sessions
Lab 5: Lab Guide
Hooking to -> Hide Data
Hiding Application Data
Lab 6: Hooking the API
Lab 6: Lab Guide
Traversing In-Memory Data Structures
Lab 7: Pointer Arithmetic
Lab 7: Lab Guide
Abusing Data Parsers
Lab 8: Mischief Managed
Lab 8: Lab Guide
Lab 8: Quiz
Calling Native Functions
Calling Native functions
Lab 9: Going Native
Lab 9: Lab Guide
Case Study: Defeating Symantec 2FA
UX/UI Romance Story
Lab 10: A Window to the Heart
Lab 10: Lab Guide
API Automation
Lab 11: Automation
Lab 11: Lab Guide
Case Study: Antimalware Scan Interface (AMSI)
Antimalware Scan Interface (AMSI)
Lab 12: HAMSICONTEXT
Lab 12: Lab Guide
Binary Instrumentation With Stalker
Binary Instrumentation With Stalker
Lab 13: Stalker
Lab 13: Lab Guide
Case Study: Minesweeper
Finally something that matters, Minesweeper
Lab 14: Parsing Board State
Lab 14: Lab Guide
We must go deeper
Lab 15: Automation
Lab 15: Lab Guide
Case Study: DLL Side-Loading
DLL Side-Loading
Lab 16: LoadLibraryExW
Lab 16: Lab Guide
Unit Testing
Lab 17: In-Memory Unit Testing
Lab 17: Lab Guide
PwnAdventure3 Introduction
It's only Game -> PwnAdventure3
Lab 18: Jump Mechanics
Lab 18: Lab Guide
__thiscall Calling Convention
Lab 19: Accessing __thiscall Objects
Lab 19: Lab Guide
Implementing A "Cheat Engine"
Repurposing Application Functionality
Lab 20: Talk talk talk
Lab 20: Lab Guide
Symbol Analysis
Lab 21: Porting to our "Cheat Engine"
Lab 21: Lab Guide
Leveraging Native Game Functionality
Traveling Fast, Traveling Far
Lab 22: Teleportation
Lab 22: Lab Guide
What about p0wn?
Lab 23: Bears With Guns
Lab 23: Lab Guide
Alternate p0wnage -> I Take No Damage
Alternate p0wnage -> The Birds and the Bears
Bonus p0wnage -> Loot Goblin
Advanced Data Structures
PwnAdventure3 Server Setup
C++ Map Containers
Lab 24: Leaking the ClientWorld
Lab 24: Lab Guide
Traversing Red/Black Trees In Memory
Lab 25: Reading the ClientWorld
Lab 25: Lab Guide
Hooking Network Traffic
Overtrained, Overspecialized
Lab 26: Dumping Packets
Lab 26: Lab Guide
Implementing the Network Protocol
Lab 27: Parsing Packets
Lab 27: Lab Guide
Course Review
Course Review
Course Feedback
Lesson unavailable
Please
login to your account
or
buy the course
.