Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Linux Binary Analysis

Buy

Key Features

  • Grasp the intricacies of the ELF binary format of UNIX and Linux
  • Design tools for reverse engineering and binary forensic analysis
  • Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes

Book Description

Learning Linux Binary Analysis is packed with knowledge and code that will teach you the inner workings of the ELF format, and the methods used by hackers and security analysts for virus analysis, binary patching, software protection and more.

This book will start by taking you through UNIX/Linux object utilities, and will move on to teaching you all about the ELF specimen. You will learn about process tracing, and will explore the different types of Linux and UNIX viruses, and how you can make use of ELF Virus Technology to deal with them.

The latter half of the book discusses the usage of Kprobe instrumentation for kernel hacking, code patching, and debugging. You will discover how to detect and disinfect kernel-mode rootkits, and move on to analyze static code. Finally, you will be walked through complex userspace memory infection analysis.

This book will lead you into territory that is uncharted even by some experts; right into the world of the computer hacker.

What you will learn

  • Explore the internal workings of the ELF binary format
  • Discover techniques for UNIX Virus infection and analysis
  • Work with binary hardening and software anti-tamper methods
  • Patch executables and process memory
  • Bypass anti-debugging measures used in malware
  • Perform advanced forensic analysis of binaries
  • Design ELF-related tools in the C language
  • Learn to operate on memory with ptrace

About the Author

Ryan "elfmaster" O'Neill is a computer security researcher and software engineer with a background in reverse engineering, software exploitation, security defense, and forensics technologies. He grew up in the computer hacker subculture, the world of EFnet, BBS systems, and remote buffer overflows on systems with an executable stack. He was introduced to system security, exploitation, and virus writing at a young age. His great passion for computer hacking has evolved into a love for software development and professional security research. Ryan has spoken at various computer security conferences, including DEFCON and RuxCon, and also conducts a 2-day ELF binary hacking workshop.

He has an extremely fulfilling career and has worked at great companies such as Pikewerks, Leviathan Security Group, and more recently Backtrace as a software engineer.

Ryan has not published any other books, but he is well known for some of his papers published in online journals such as Phrack and VXHeaven. Many of his other publications can be found on his website at http://www.bitlackeys.org.

Table of Contents

  1. The Linux Environment and Its Tools
  2. The ELF Binary Format
  3. Linux Process Tracing
  4. ELF Virus Technology – Linux/Unix Viruses
  5. Linux Binary Protection
  6. ELF Binary Forensics in Linux
  7. Process Memory Forensics
  8. ECFS – Extended Core File Snapshot Technology
  9. Linux /proc/kcore Analysis
(HTML tags aren't allowed.)

Strategies for Information Technology Governance
Strategies for Information Technology Governance
This text records and interprets some important existing theories, models and practices in the IT Governance domain and aims to contribute to the understanding of IT Governance.

In many organizations, Information Technology (IT) has become crucial in the support, the sustainability and the growth of the business. This pervasive use of...

Data Management for Multimedia Retrieval
Data Management for Multimedia Retrieval

Multimedia data require specialized management techniques because the representations of color, time, semantic concepts, and other underlying information can be drastically different from one another. The user's subjective judgment can also have significant impact on what data or features are relevant in a given context. These factors...

The Oxford Handbook of Political Institutions (Oxford Handbooks of Political Science)
The Oxford Handbook of Political Institutions (Oxford Handbooks of Political Science)
The thoughtful essays in the handbooks are far more than literature reviews. Scholars and students will find them to be an invaluable resource for many years to come. Morris P. Fiorina, Senior, Fellow at the Hoover Institution and Wendt Family Professor of Political Science at Stanford University A paramount effort coordinated by Robert Goodin for...

Pinnacle Studio 9 Ignite!
Pinnacle Studio 9 Ignite!
Covering the popular video editing and DVD authoring software that is used by 3.5 million users, "Pinnacle Studio 9 Ignite!" is a visual guide that will have you up and running in no time. With the many enhancements of Pinnacle Studio 9, this book is not only suitable for beginners, but also for users of Pinnacle looking to brush up on...
Data Mining: Foundations and Intelligent Paradigms: Volume 3: Medical, Health, Social, Biological and other Applications (Intelligent Systems Reference Library)
Data Mining: Foundations and Intelligent Paradigms: Volume 3: Medical, Health, Social, Biological and other Applications (Intelligent Systems Reference Library)
There are many invaluable books available on data mining theory and applications. However, in compiling a volume titled “DATA MINING: Foundations and Intelligent Paradigms: Volume 3: Medical, Health, Social, Biological and other Applications” we wish to introduce some of the latest developments to a broad audience of both...
Core Concepts in Data Analysis: Summarization, Correlation and Visualization
Core Concepts in Data Analysis: Summarization, Correlation and Visualization

In this textbook, I take an unconventional approach to data analysis. Its contents are heavily influenced by the idea that data analysis should help in enhancing and augmenting knowledge of the domain as represented by the concepts and statements of relation between them. According to this view, two main pathways for data analysis are...

©2018 LearnIT (support@pdfchm.net) - Privacy Policy