| No source code? No problem. With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use.
Hailed by the creator of IDA Pro as the "long-awaited" and "information-packed" guide to IDA, The IDA Pro Book covers everything from the very first steps to advanced automation techniques. While other disassemblers slow your analysis with inflexibility, IDA invites you to customize its output for improved readability and usefulness. You'll save time and effort as you learn to:
- Identify known library routines, so you can focus your analysis on other areas of the code
- Extend IDA to support new processors and filetypes, making disassembly possible for new or obscure architectures
- Explore popular plug-ins that make writing IDA scripts easier, allow collaborative reverse engineering, and much more
- Utilize IDA's built-in debugger to tackle obfuscated code that would defeat a stand-alone disassembler
You'll still need serious assembly skills to tackle the toughest executables, but IDA makes things a lot easier. Whether you're analyzing the software on a black box or conducting hard-core vulnerability research, a mastery of IDA Pro is crucial to your success. Take your skills to the next level with The IDA Pro Book.
About the Author Chris Eagle is a Senior Lecturer and Associate Chairman of Computer Science at the Naval Postgraduate School in Monterey, CA. He is a co-author of Gray Hat Hacking and has spoken at numerous security conferences, including Blackhat, Defcon, Toorcon, and Shmoocon. Along with his team, the Sk3wl0fR00t, he is a past winner of the Defcon Capture the Flag hacking competition. |
|
|
The Mobile Revolution: The Making of Worldwide Mobile Markets‘We’re moving away from the business of ears to the business of eyes.’
Move over Bill Gates, stand aside Steve Jobs, said the industry pundits after CeBIT 1998, the famous trade conference. They’d just seen Nokia’s Communicator 9110, a mobile phone with dazzling capabilities, but what really... | | | | The Falklands War: An Imperial History
Why did Britain and Argentina go to war over a wintry archipelago that was home to an unprofitable colony? Could the Falklands War, in fact, have been a last-ditch revival of Britain's imperial past? Despite widespread conjecture about the imperial dimensions of the Falklands War, this is the first history of the conflict from the... |
The UX Book: Process and Guidelines for Ensuring a Quality User Experience
The UX Book, winner of a 2013 Most Promising New Textbook Award from the Text and Academic Authors Association, is a comprehensive textbook on designing interaction to ensure a quality user experience. Combining breadth, depth, and practical applications, this book takes a time-tested process-and-guidelines approach that provides... | | | | Learning Perl on Win32 SystemsIn this smooth, carefully paced course, leading Perl trainers and a Windows NT practitioner teach you to program in the language that promises to emerge as the scripting language of choice on NT. Perl for Win32 is a language for easily manipulating text, files, user and group profiles, performance and event logs, and registry entries. Based on... |
|