Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Linux Binary Analysis

Buy

Key Features

  • Grasp the intricacies of the ELF binary format of UNIX and Linux
  • Design tools for reverse engineering and binary forensic analysis
  • Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes

Book Description

Learning Linux Binary Analysis is packed with knowledge and code that will teach you the inner workings of the ELF format, and the methods used by hackers and security analysts for virus analysis, binary patching, software protection and more.

This book will start by taking you through UNIX/Linux object utilities, and will move on to teaching you all about the ELF specimen. You will learn about process tracing, and will explore the different types of Linux and UNIX viruses, and how you can make use of ELF Virus Technology to deal with them.

The latter half of the book discusses the usage of Kprobe instrumentation for kernel hacking, code patching, and debugging. You will discover how to detect and disinfect kernel-mode rootkits, and move on to analyze static code. Finally, you will be walked through complex userspace memory infection analysis.

This book will lead you into territory that is uncharted even by some experts; right into the world of the computer hacker.

What you will learn

  • Explore the internal workings of the ELF binary format
  • Discover techniques for UNIX Virus infection and analysis
  • Work with binary hardening and software anti-tamper methods
  • Patch executables and process memory
  • Bypass anti-debugging measures used in malware
  • Perform advanced forensic analysis of binaries
  • Design ELF-related tools in the C language
  • Learn to operate on memory with ptrace

About the Author

Ryan "elfmaster" O'Neill is a computer security researcher and software engineer with a background in reverse engineering, software exploitation, security defense, and forensics technologies. He grew up in the computer hacker subculture, the world of EFnet, BBS systems, and remote buffer overflows on systems with an executable stack. He was introduced to system security, exploitation, and virus writing at a young age. His great passion for computer hacking has evolved into a love for software development and professional security research. Ryan has spoken at various computer security conferences, including DEFCON and RuxCon, and also conducts a 2-day ELF binary hacking workshop.

He has an extremely fulfilling career and has worked at great companies such as Pikewerks, Leviathan Security Group, and more recently Backtrace as a software engineer.

Ryan has not published any other books, but he is well known for some of his papers published in online journals such as Phrack and VXHeaven. Many of his other publications can be found on his website at http://www.bitlackeys.org.

Table of Contents

  1. The Linux Environment and Its Tools
  2. The ELF Binary Format
  3. Linux Process Tracing
  4. ELF Virus Technology – Linux/Unix Viruses
  5. Linux Binary Protection
  6. ELF Binary Forensics in Linux
  7. Process Memory Forensics
  8. ECFS – Extended Core File Snapshot Technology
  9. Linux /proc/kcore Analysis
(HTML tags aren't allowed.)

Learning Spaces: Interdisciplinary Applied Mathematics
Learning Spaces: Interdisciplinary Applied Mathematics

Learning spaces offer a rigorous mathematical foundation for practical systems of educational technology. Learning spaces generalize partially ordered sets and are special cases of knowledge spaces. The various structures are investigated from the standpoints of combinatorial properties and stochastic processes.

Leaning spaces have...

Becoming A Master Dater: 7 Simple Steps To Rewrite Your Love Story
Becoming A Master Dater: 7 Simple Steps To Rewrite Your Love Story

After spending countless years wondering where her prince charming was, Laura decided to go on a mission. She was determined to fix the common denominator in countless failed relationships... which was HERSELF. It was the only thing she had control of, and she was so exhausted from calling in men that were draining her internal...

Integrating and Extending BIRT (2nd Edition)
Integrating and Extending BIRT (2nd Edition)
The world-wide developer community has downloaded over three million copies of BIRT (Business Intelligence and Reporting Tools) from the Eclipse web site. Built on the open-source Eclipse platform, BIRT is a powerful reporting system that provides an end-to-end solution, from creating and deploying reports to integrating report capabilities in...

PHP: A Beginner’s Guide (Osborne Mcgraw Hill)
PHP: A Beginner’s Guide (Osborne Mcgraw Hill)
No matter which way you cut it, PHP is pretty amazing: a language strung together by volunteer programmers that today has the enviable distinction of being in use on more than a third of the planet’s Web servers. Flexible, scalable, extensible, stable, open—PHP is all of these and more, which is why it’s one of the most popular...
Intellectual Freedom and the Culture Wars (Palgrave Studies in Classical Liberalism)
Intellectual Freedom and the Culture Wars (Palgrave Studies in Classical Liberalism)

This book offers a sustained and vigorous defence of free expression and objective enquiry situated in the context of the current culture wars. In the spirit of J. S. Mill, Benn investigates objections to the ideal of free expression in relation to harm and offence, reaching broadly liberal conclusions with reference to recent...

Basic Ship Theory Volume 1, Fifth Edition
Basic Ship Theory Volume 1, Fifth Edition

Rawson and Tupper's Basic Ship Theory, first published in 1968, is widely known as the standard introductory text for naval architecture students, as well as being a useful reference for the more experienced designer.
The fifth edition continues to provide a balance between theory and practice. Volume 1 discusses ship geometry and
...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy