Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Linux Binary Analysis

Buy

Key Features

  • Grasp the intricacies of the ELF binary format of UNIX and Linux
  • Design tools for reverse engineering and binary forensic analysis
  • Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes

Book Description

Learning Linux Binary Analysis is packed with knowledge and code that will teach you the inner workings of the ELF format, and the methods used by hackers and security analysts for virus analysis, binary patching, software protection and more.

This book will start by taking you through UNIX/Linux object utilities, and will move on to teaching you all about the ELF specimen. You will learn about process tracing, and will explore the different types of Linux and UNIX viruses, and how you can make use of ELF Virus Technology to deal with them.

The latter half of the book discusses the usage of Kprobe instrumentation for kernel hacking, code patching, and debugging. You will discover how to detect and disinfect kernel-mode rootkits, and move on to analyze static code. Finally, you will be walked through complex userspace memory infection analysis.

This book will lead you into territory that is uncharted even by some experts; right into the world of the computer hacker.

What you will learn

  • Explore the internal workings of the ELF binary format
  • Discover techniques for UNIX Virus infection and analysis
  • Work with binary hardening and software anti-tamper methods
  • Patch executables and process memory
  • Bypass anti-debugging measures used in malware
  • Perform advanced forensic analysis of binaries
  • Design ELF-related tools in the C language
  • Learn to operate on memory with ptrace

About the Author

Ryan "elfmaster" O'Neill is a computer security researcher and software engineer with a background in reverse engineering, software exploitation, security defense, and forensics technologies. He grew up in the computer hacker subculture, the world of EFnet, BBS systems, and remote buffer overflows on systems with an executable stack. He was introduced to system security, exploitation, and virus writing at a young age. His great passion for computer hacking has evolved into a love for software development and professional security research. Ryan has spoken at various computer security conferences, including DEFCON and RuxCon, and also conducts a 2-day ELF binary hacking workshop.

He has an extremely fulfilling career and has worked at great companies such as Pikewerks, Leviathan Security Group, and more recently Backtrace as a software engineer.

Ryan has not published any other books, but he is well known for some of his papers published in online journals such as Phrack and VXHeaven. Many of his other publications can be found on his website at http://www.bitlackeys.org.

Table of Contents

  1. The Linux Environment and Its Tools
  2. The ELF Binary Format
  3. Linux Process Tracing
  4. ELF Virus Technology – Linux/Unix Viruses
  5. Linux Binary Protection
  6. ELF Binary Forensics in Linux
  7. Process Memory Forensics
  8. ECFS – Extended Core File Snapshot Technology
  9. Linux /proc/kcore Analysis
(HTML tags aren't allowed.)

Taoism For Dummies
Taoism For Dummies

The definitive guide to understanding Taoism—no matter your background or faith

Lao Tzu's Tao Te Ching is the second most translated book in the world, and the practice of religious Taoism is on the rise in China, where adherents currently number in the hundreds of millions. Yet there remains a remarkable...

Atrial Fibrillation after Cardiac Surgery (Developments in Cardiovascular Medicine)
Atrial Fibrillation after Cardiac Surgery (Developments in Cardiovascular Medicine)

Cardiac surgery is performed on hundreds of thousands of patients a year, and can have an important beneficial impact on the outcomes of patients with coronary and valvular heart diseases. Despite the favorable recovery of most patients, some will have their post-operative period interrupted by the development of atrial fibrillation, with a...

Multimedia Fingerprinting Forensics for Traitor Tracing (EURASIP Book Series on Signal Processing and Communications)
Multimedia Fingerprinting Forensics for Traitor Tracing (EURASIP Book Series on Signal Processing and Communications)
The popularity of multimedia content has led to the widespread distribution and consumption of digital multimedia data. As a result of the relative ease with which individuals may now alter and repackage digital content, ensuring that media content is employed by authorized users for its intended purpose is becoming an issue of eminent importance...

Microsoft SharePoint 2010 End User Guide: Business Performance Enhancement
Microsoft SharePoint 2010 End User Guide: Business Performance Enhancement

An essential hands-on guide, this book describes functionality, ideas and terminology related to SharePoint and applies the knowledge to enhance your business. This is not a heavy technical book for the professional IT department power user, weighed down with technical jargon and techniques, but a tutorial full of great advice and short cuts...

Joe Celko's SQL Puzzles and Answers, Second Edition (The Morgan Kaufmann Series in Data Management Systems)
Joe Celko's SQL Puzzles and Answers, Second Edition (The Morgan Kaufmann Series in Data Management Systems)
Joe Celko has been writing columns for the computer trade press and championing database programming techniques and ANSI/ISO standards via his newsgroup activity for 20 years.

In this complete revision and expansion of his first SQL Puzzles book, he challenges you with his trickiest puzzlesand then helps solve them with a variety of
...
Microsoft Visio 2013 Step By Step (Step by Step (Microsoft))
Microsoft Visio 2013 Step By Step (Step by Step (Microsoft))

The smart way to learn Microsoft Visio 2013—one step at a time!

Experience learning made easy—and quickly teach yourself how to create professional-looking business and technical diagrams with Visio 2013. With Step by Step, you set the pace—building and practicing the skills you need, just when...

©2018 LearnIT (support@pdfchm.net) - Privacy Policy