Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Buy

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching techniques with tools such as IDA Pro, x86dbg, and Radare2.
  • Explore modern security techniques to identify, exploit, and avoid cyber threats

Book Description

If you want to analyze software in order to exploit its weaknesses and strengthen its defenses, then you should explore reverse engineering. Reverse Engineering is a hackerfriendly tool used to expose security flaws and questionable privacy practices.In this book, you will learn how to analyse software even without having access to its source code or design documents. You will start off by learning the low-level language used to communicate with the computer and then move on to covering reverse engineering techniques. Next, you will explore analysis techniques using real-world tools such as IDA Pro and x86dbg. As you progress through the chapters, you will walk through use cases encountered in reverse engineering, such as encryption and compression, used to obfuscate code, and how to to identify and overcome anti-debugging and anti-analysis tricks. Lastly, you will learn how to analyse other types of files that contain code.

By the end of this book, you will have the confidence to perform reverse engineering.

What you will learn

  • Learn core reverse engineering
  • Identify and extract malware components
  • Explore the tools used for reverse engineering
  • Run programs under non-native operating systems
  • Understand binary obfuscation techniques
  • Identify and analyze anti-debugging and anti-analysis tricks

Who this book is for

If you are a security engineer or analyst or a system programmer and want to use reverse engineering to improve your software and hardware, this is the book for you. You will also find this book useful if you are a developer who wants to explore and learn reverse engineering. Having some programming/shell scripting knowledge is an added advantage.

Table of Contents

  1. Preparing to Reverse
  2. Identification and extraction of hidden components
  3. The Low-Level Language
  4. Static and Dynamic Reversing
  5. Tools of the trade
  6. RE in Linux platforms
  7. RE in Windows platforms
  8. Sandboxing: Virtualization as a component for RE
  9. Binary Obfuscation Techniques
  10. Packing and Encryption
  11. Anti-analysis Tricks
  12. Practical Reverse Engineering of a Windows Executable
  13. Reversing various File-types
(HTML tags aren't allowed.)

Effective Math Interventions: A Guide to Improving Whole-Number Knowledge (The Guilford Practical Intervention in the Schools Series)
Effective Math Interventions: A Guide to Improving Whole-Number Knowledge (The Guilford Practical Intervention in the Schools Series)
Building foundational whole-number knowledge can help put K-5 students on the path to academic success and career readiness. Filling a gap for school practitioners, this book presents step-by-step guidelines for designing and implementing classwide, small-group, and individual interventions for mathematics difficulties. Effective procedures...
Solaris 10 System Administration Exam Prep™
Solaris 10 System Administration Exam Prep™

The Solaris 10 System Administrator Certification Exam Prep 2 is the ideal book for both new and seasoned system administrators. This book will give you the insight you need into the newest certification exams for system administrators, the 310-200 and the 310-202. It offers classroom-style...

Systems Biology: Properties of Reconstructed Networks
Systems Biology: Properties of Reconstructed Networks
Genome sequences are now available that enable us to determine the biological components that make up a cell or an organism. The new discipline of systems biology examines how these components interact and form networks, and how the networks generate whole cell functions corresponding to observable phenotypes. This textbook describes how to model...

Opengl Superbible: The Complete Guide to Opengl Programming for Windows Nt and Windows 95
Opengl Superbible: The Complete Guide to Opengl Programming for Windows Nt and Windows 95

Welcome to OpenGL SuperBible! The first time I ever heard of OpenGL was at the 1992 Win32 Developers Conference in San Francisco. Windows NT 3.1 was in early beta (or late alpha) and many vendors were present, pledging their future support for this exciting new platform. Among them was a company called Silicon Graphics, Inc. (SGI)....

Apple Pro Training Series : Getting Started With Motion
Apple Pro Training Series : Getting Started With Motion

Welcome to the official introductory training course for Motion, Apple's dynamic and powerful motion graphics compositing software. This book is a detailed guide to creating motion graphics projects using Motion and the library of more than 4 GB of royalty-free content that is included with the software. It is based on the...

Immunotherapy in 2020: Visions and Trends for Targeting Inflammatory Disease (Ernst Schering Foundation Symposium Proceedings)
Immunotherapy in 2020: Visions and Trends for Targeting Inflammatory Disease (Ernst Schering Foundation Symposium Proceedings)

This volume features contributions from participants of the ESRF symposium on Immunotherapy in 2020―Visions and Trends for Targeting Inflammatory Diseases held in Potsdam near Berlin, Germany, in October 2006. The symposium presentations covered the main mechanisms of immunoregulation.

...
©2020 LearnIT (support@pdfchm.net) - Privacy Policy