Practical Reverse Engineering
X86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Book Details:
Pages: | 384 |
Published: | Feb 17 2014 |
Posted: | Nov 19 2014 |
Language: | English |
Book format: | PDF |
Book size: | 4.57 MB |
Book Description:
Analyzing how hacks are done, so as to stop them in the futureReverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks.The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples.Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examplesCovers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniquesProvides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by stepDemystifies topics that have a steep learning curveIncludes a bonus chapter on reverse engineering toolsPractical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Toolsprovides crucial, up-to-date guidance for a broad range of IT professionals.
Techniques for Decompiling, Patching, and Reverse Engineering
As a Java developer, you may find yourself in a situation where you have to maintain someone else's code or use a third-party's library for your own application without documentation of the original source code. Rather than spend hours feeling like you want to bang your head against the wall, turn to Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering. These techniques will show you how to better understand and work with third-party applications. Each chapter focuses on a technique to solve a specific problem, such as obfuscation in code or scalability vulnerabilities, outlining the issue and demonstrating possible solutions. Summaries at the end of each chapter will help you double check that you understood the crucial points ...
Describes how to design object-oriented code and accompanying algorithms that can be reverse engineered for greater flexibility in future code maintenance and alteration. Provides essential object-oriented concepts and programming methods for software engineers and researchers....
If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pro's interactive interface and programmable development language provide you with complete control over code disassembly and debugging. This is the only book which focuses exclusively on the world's most powerful and popular took for reverse engineering code.*Reverse Engineer REAL Hostile CodeTo follow along with this chapter, you must download a file called !DANGER!INFECTEDMALWARE!DANGER!... 'nuff said.*Download the Code!The companion Web sit...
2007 - 2021 © eBooks-IT.org