Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacker Disassembling Uncovered

Buy
This text shows how to analyze programs without its source code, using a debugger and a disassembler, and covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and more.

This book is dedicated to the basics of hacking—methods of analyzing programs using a debugger and disassembler. There is huge interest in this topic, but in reality, there are very few programmers who have mastered these methods on a professional level.

The majority of publications that touch on issues of analyzing and optimizing programs, as well as creating means of protecting information, delicately tiptoe around the fact that in order to competently find "holes" in a program without having its source code, you have to disassemble them. Restoring something that even somewhat resembles the source code is still considered an extremely complex task. In the book, the author describes a technology used by hackers that gives a practically identical source code, and this includes programs in C++ as well, which are particularly difficult to disassemble.

The book gives a detailed description of ways to identify and reconstruct key structures of the source language—functions (including virtual ones), local and global variables, branching, loops, objects and their hierarchy, mathematical operators, etc. The disassembly methodology that we will look at has been formalized—i.e., it has been translated from an intuitive concept into a complete technology, available and comprehensible to almost anyone.

The book contains a large number of unique practical materials. It is organized in such a manner that it will most certainly be useful to the everyday programmer as a manual on optimizing programs for modern intelligent compilers, and to the information protection specialist as a manual on looking for so-called "bugs." The "from simple to complex" style of the book allows it to easily be used as a textbook for beginner analyzers and "code diggers."

About the Editor

Kris Kaspersky is the author of articles on hacking, disassembling, and code optimization. He has dealt with issues relating to security and system programming including compiler development, optimization techniques, security mechanism research, real-time OS kernel creation, and writing antivirus programs.

(HTML tags aren't allowed.)

Graphic Design Portfolio-Builder : Adobe Photoshop and Adobe Illustrator Projects
Graphic Design Portfolio-Builder : Adobe Photoshop and Adobe Illustrator Projects
Self-paced, self-guided instruction is all well and good, but at the end of the day, most people could use a little feedback--especially when they're ready to build a design portfolio and hit the job market. Not to worry, this book provides actual instructor feedback along with the self-paced, individualized instruction in Photoshop and Illustrator...
International Security and the United States: An Encyclopedia (Praeger Security International)
International Security and the United States: An Encyclopedia (Praeger Security International)

Shaped by often very dramatic events, international security and the international system have changed significantly in recent years. The conclusion of the Cold War, the emergence of new political systems, the growth of significant threats such as terrorism, and the development of new security doctrines have driven global transformation. These...

Barcodes for Mobile Devices
Barcodes for Mobile Devices

From inventory management in stores to automotive part tracking in assembly plants, barcodes are one of the most prevalent automatic identification and data capture technologies. This book provides a complete introduction to barcodes for mobile devices, presenting the most relevant and up-to-date information previously unavailable elsewhere...


Nutrient-Gene Interactions in Health and Disease (Modern Nutrition)
Nutrient-Gene Interactions in Health and Disease (Modern Nutrition)

We have come to realize that optimal nutrient intake is determined by very specific genetic messages. This realization has led to an entirely new approach to understanding nutrition – the exploration of nutrient effects on gene expression.

Edited by leading experts in the field, Nutrient–Gene Interactions in Health...

iPhone and iPad Apps Marketing: Secrets to Selling Your iPhone and iPad Apps (Que Biz-Tech)
iPhone and iPad Apps Marketing: Secrets to Selling Your iPhone and iPad Apps (Que Biz-Tech)

The Easy, Complete, Step-by-Step Guide to Marketing Your iPhone/iPad Apps!

There are huge profits to be made in selling iPhone and iPad apps! But with more than 180,000 + apps now available, just getting your app into the App Store is no longer enough. You need to market it...

Microsoft BizTalk Server 2010 Unleashed
Microsoft BizTalk Server 2010 Unleashed

Microsoft BizTalk Server 2010 Unleashed is the 100% new, 100% practical developer’s guide to Microsoft’s most powerful version of BizTalk Server. Written by an expert team of Microsoft insiders and BizTalk MVPs, it reflects unsurpassed experience with all phases of BizTalk enterprise solutions...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy