Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Buy

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching techniques with tools such as IDA Pro, x86dbg, and Radare2.
  • Explore modern security techniques to identify, exploit, and avoid cyber threats

Book Description

If you want to analyze software in order to exploit its weaknesses and strengthen its defenses, then you should explore reverse engineering. Reverse Engineering is a hackerfriendly tool used to expose security flaws and questionable privacy practices.In this book, you will learn how to analyse software even without having access to its source code or design documents. You will start off by learning the low-level language used to communicate with the computer and then move on to covering reverse engineering techniques. Next, you will explore analysis techniques using real-world tools such as IDA Pro and x86dbg. As you progress through the chapters, you will walk through use cases encountered in reverse engineering, such as encryption and compression, used to obfuscate code, and how to to identify and overcome anti-debugging and anti-analysis tricks. Lastly, you will learn how to analyse other types of files that contain code.

By the end of this book, you will have the confidence to perform reverse engineering.

What you will learn

  • Learn core reverse engineering
  • Identify and extract malware components
  • Explore the tools used for reverse engineering
  • Run programs under non-native operating systems
  • Understand binary obfuscation techniques
  • Identify and analyze anti-debugging and anti-analysis tricks

Who this book is for

If you are a security engineer or analyst or a system programmer and want to use reverse engineering to improve your software and hardware, this is the book for you. You will also find this book useful if you are a developer who wants to explore and learn reverse engineering. Having some programming/shell scripting knowledge is an added advantage.

Table of Contents

  1. Preparing to Reverse
  2. Identification and extraction of hidden components
  3. The Low-Level Language
  4. Static and Dynamic Reversing
  5. Tools of the trade
  6. RE in Linux platforms
  7. RE in Windows platforms
  8. Sandboxing: Virtualization as a component for RE
  9. Binary Obfuscation Techniques
  10. Packing and Encryption
  11. Anti-analysis Tricks
  12. Practical Reverse Engineering of a Windows Executable
  13. Reversing various File-types
(HTML tags aren't allowed.)

Propeller Programming: Using Assembler, Spin, and C
Propeller Programming: Using Assembler, Spin, and C
Learn to program the Propeller in Spin and C and how to map the Propeller Assembler (PASM) language from other high-level languages you might know.

The overall task you will pursue in the book is to implement a Delta Compression algorithm: first in Spin, then in PASM, then in C. Along the way, you'll review
...
Hands-On Microservices with Rust: Build, test, and deploy scalable and reactive microservices with Rust 2018
Hands-On Microservices with Rust: Build, test, and deploy scalable and reactive microservices with Rust 2018

A comprehensive guide in developing and deploying high performance microservices with Rust

Key Features

  • Start your microservices journey and get a broader perspective on microservices development using RUST 2018,
  • Build, deploy, and test microservices using AWS
  • ...
Performance Evaluation Software: Moving Object Detection and Tracking in Videos (SpringerBriefs in Computer Science)
Performance Evaluation Software: Moving Object Detection and Tracking in Videos (SpringerBriefs in Computer Science)

Performance Evaluation Software: Moving Object Detection and Tracking in Videos introduces a software approach for the real-time evaluation and performance comparison of the methods specializing in moving object detection and/or tracking (D&T) in video processing. Digital video content analysis is an important item for...


Trauma: Critical Care (Volume 2)
Trauma: Critical Care (Volume 2)

Compiled by internationally recognized experts in trauma critical care,this sourcediscusses the entire gamut of critical care management of the trauma patient and covers several common complications and conditions treated in surgical intensive care units that are not specifically related to trauma.  Utilizing evidence-based guidelines...

SQL Cookbook
SQL Cookbook

You know the rudiments of the SQL query language, yet you feel you aren't taking full advantage of SQL's expressive power. You'd like to learn how to do more work with SQL inside the database before pushing data across the network to your applications. You'd like to take your SQL skills to the next level.

...
Mashup Patterns: Designs and Examples for the Modern Enterprise
Mashup Patterns: Designs and Examples for the Modern Enterprise
Using new mashup tools and technologies, enterprise developers can impose their own APIs on everything from Web sites and RSS feeds to Excel and PDF files–transforming a world of content into their own customized informationsource. In Mashup Patterns, Michael Ogrinz applies the concept of software development...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy