View Full Version : Video #5 is up.
TiGa
November 7th, 2007, 18:11
New addition to the Reverse Code Engineering Community Forum video tutorial website:
http://video.reverse-engineering.net
Video #5: x64 Disassembling and Fixing obfuscated APIs with IDA
In this one I compare two programs compiled in x86 PE format and x64 PE32+ format with GoAsm from the same source.
Also previous download packages have been updated (some files were missing) and I added a warning about a bug when tracing with IDA 5.1 in video #3.
Comments/Questions/Suggestions are always welcome.
naides
November 7th, 2007, 20:32
Thank you very very much TiGa.
A picture is worth 1k words,
a tut with pics is worth 1M words. . .
But a good video tutorial, is PRICELESS, for everything else there is MasterCard
http://video.google.com/videoplay?docid=-7080249386699679232&q=mastercard+priceless+video&total=1015&start=0&num=10&so=0&type=search&plindex=0
JMI
November 7th, 2007, 20:52
Nadies:
You made my day! Loved the video.
TiGa:
Enjoyed the other 4. I'm sure this one will be equally educational, even if not quite as "funny" as nadies.
By the way, I was wondering which software you use to produce the videos. I've looked at a couple but like whatever it is you are using.
Keep'em coming when you have time.
Regards.
TiGa
November 8th, 2007, 02:39
I use Instant Demo but Camtasia Studio is a more professional tool.
As far as i know, these are the only two that can record VMs from the host OS.
The good thing with Instant Demo is that the mouse pointer path is recorded separately than the screenshots (frames).
That's why you don't see my mouse wandering around aimlessly.

Aimless
November 8th, 2007, 04:25
Hmmm... did someone just call my name?
TiGa... nice work. And yes, 5.1 cannot seem to trace properly, while 5.0 does, thanks for clarifying (some other post on this board...)
Have Phun
Powered by vBulletin® Version 4.2.2 Copyright © 2018 vBulletin Solutions, Inc. All rights reserved.