Reverse Engineering for Beginners With Cutter
Learn reverse engineering for beginners with Cutter on Windows and Linux, covering static analysis, debugging, patching, and more. Designed for beginners, this hands-on course teaches essential skills to tackle Crackme challenges and real-world applications.

What Youβll Learn
This Reverse Engineering for Beginners With Cutter will teach you:
- Cutter Interface Overview:
Explore Cutterβs user-friendly GUI and advanced features. - Static and Dynamic Analysis:
Perform both static analysis and step-by-step debugging. - Reverse Debugging:
Utilize Cutter's reverse debugging for efficient code analysis. - Memory Analysis:
Learn to trace stack, register, and inspect memory dynamically.
- Binary Patching Techniques:
Modify code using NOPs, reversing jumps, and patching instructions. - Windows API Exploration:
Understand and use the Windows API to reverse engineer applications. - Advanced Phishing Techniques:
Extract serial keys and passwords using Cutterβs tools. - Reverse Engineering with Rizin:
Integrate Rizin console commands for enhanced analysis.
Included in the Reverse Engineering for Beginners With Cutter Course
Suitable for the Following Careers
Course Content
Description
Introduction
Installing the tools
Introduction to the Cutter User Interface and Downloading Crackme's
Basic Static Analysis
Basic Dynamic Analysis and Stepping Over
Patching binaries: reversing jumps
Patching: Replacing jumps with NOPs
Patching: xor eax, eax
Gui-Crackme: String search method, defining functions and windows API
Analyzing the windows API stack
Using xor eax, eax to set APl parameter and also bypass jump
Phishing for the serial key
Installing Cutter for Linux
Intro to Linux crackmes, changing themes and the esc button
Renaming variables to aid static analysis
Cutter's new Reverse debugging feature
Using the Rizin console and the rax2 command
Linux crackme2: Using the Debuggee Console
Stepping into function calls
Phising passwords by analyzing registers and hexdumps
Resources for further study
Audio Version of Trainingt
OPEN FULL CURRICULUM
Requirements
Description of Reverse Engineering for Beginners With Cutter Training
This course is designed for those who want to learn how to use Cutter, a powerful GUI-based reverse engineering tool, to analyze and debug programs on Windows and Linux. You'll learn how to perform static and dynamic analysis, debug executables, patch programs, and more using Cutterβs advanced features like reverse debugging and disassembling to C code.
Through hands-on lessons and legal Crackme exercises, this course ensures you gain practical skills in reverse engineering. You'll also learn about various tools and techniques, such as stack analysis, patching with NOPs, and utilizing the Windows API, making you proficient in this powerful tool. Key takeaways include:
- Understanding the Cutter interface and basic static analysis techniques
- Stepping through and debugging code dynamically
- Patching binaries: reversing jumps, replacing jumps with NOPs
- Performing phishing for passwords using memory analysis techniques
- Utilizing the Rizin console and reverse debugging features
By the end of this course, youβll be well-versed in using Cutter to perform reverse engineering tasks, making you confident in tackling Crackme challenges and real-world analysis scenarios.
Who Is This Course For
This course is ideal for anyone interested in learning to use Cutter for reverse engineering, including students of reverse engineering and malware analysis, security researchers, and anyone eager to understand program internals and perform hands-on analysis.
Course Instructor
Paul Chin is a semi-retired college lecturer with over 20 years of experience in teaching computing and information technology. His interests span reverse engineering, coding, graphics design, app and game development, music, health, spirituality, and well-being. In his spare time, Paul enjoys playing the piano and keyboard.
Paul is passionate about teaching both face-to-face and online, aiming to educate and inspire others to succeed and live their dreams. His course topics include reverse engineering with tools like dnSpy, Cutter, and x64dbg, WiFi hacking, C programming, HTML, JavaScript, and VR game development.
Read More
Read Less
Testimonials
Eric G.
This was a really nice intro to Cutter. I felt that it was more of an intermediate-level course that built well upon Mr. Paul Chin's "Reverse Engineering Course: x64dbg Tutorial" course. I was initially drawn to this course because of the new "reverse debugging" while tracing feature I had heard about in Cutter. I was surprised to also learn about Cutter's variable renaming, decompiling, and multi-platform abilities. I also appreciated Mr. Paul Chin walking us through Cutter's powerful Rizin console since I think I definitely would have missed that on my own.
I learned some new general debugging tips too, like how shorter/longer graphical analysis paths could indicate failed/passing checks. It was also nice to see a method for commenting while doing memory register/pointer tracing that I know I'll be borrowing to do more crackme challenges.
I would absolutely recommend this course to anyone interested in a great into to Cutter. I'm excited to have a new Windows/Linux debugger in my toolbox.
Arkan A.
Thanks for providing this course
Show More
Show Less