Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Reverse Engineering Code with IDA Pro


If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pros interactive interface and programmable development language provide you with complete control over code disassembly and debugging. This is the only book which focuses exclusively on the worlds most powerful and popular took for reverse engineering code.

*Reverse Engineer REAL Hostile Code with Dan Kaminsky
To follow along with this chapter, you must download a file called !DANGER!INFECTEDMALWARE!DANGER!... nuff said.

*Download the Code!
The companion Web site to this book offers up really evil code for you to reverse engineer and really nice code for you to automate tasks with the IDC Scripting Language.

*Portable Executable (PE) and Executable and Linking Formats (ELF)
Understand the physical layout of PE and ELF files, and analyze the components that are essential to reverse engineering.

*Break Hostile Code Armor and Write your own Exploits
Understand execution flow, trace functions, recover hard coded passwords, find vulnerable functions, backtrace execution, and craft a buffer overflow.

*Master Debugging
Debug in IDA Pro, use a debugger while reverse engineering, perform heap and stack access modification, and use other debuggers.

*Stop Anti-Reversing
Anti-reversing, like reverse engineering or coding in assembly, is an art form. The trick of course is to try to stop the person reversing the application. Find out how!

*Track a Protocol through a Binary and Recover its Message Structure
Trace execution flow from a read event, determine the structure of a protocol, determine if the protocol has any undocumented messages, and use IDA Pro to determine the functions that process a particular message.

*Develop IDA Scripts and Plug-ins
Learn the basics of IDA scripting and syntax, and write IDC scripts and plug-ins to automate even the most complex tasks.

About the Author

Dan Kaminsky is the Director of Penetration Testing for IOActive. Previously of Cisco and Avaya, Dan has been operating professionally in the security space since 1999. He is best known for his "Black Ops" series of talks at the well respected Black Hat Briefings conferences. He is also the only speaker who has attended and spoken at every single "Blue Hat" Microsoft internal training event. Dan focuses on design level fault analysis, particularly against massive-scale network applications. Dan regularly collects detailed data on the health of the worlwide Internet, and recently used this data to detect the worldwide proliferation of a major rootkit. Dan is one of the few individuals in the world to combine both technical expertise with executive level consulting skills and prowess.

Guest: If you are a seasoned IDA professional, I'd give this book a skip and wait for Chri's book that is going to come out this June (2008). But, if you are new to IDA, do read this books atleast once.
(HTML tags aren't allowed.)

The J2EE Tutorial
The J2EE Tutorial

You're familiar with Java™ programming, but now it's time for you to take it to the next level and begin creating enterprise applications with the Java™ 2 Platform, Enterprise Edition (J2EE™). The J2EE™ Tutorial is the hands-on, example-driven guide that offers unparalleled technical guidance...

Storage Network Performance Analysis
Storage Network Performance Analysis
Your in-depth guide to analyzing and fine-tuning storage area network performance

Here, for the first time, is your complete resource for optimizing SAN performance and reliability in your organization. Whether you need to evaluate an existing system or design one from the ground up, this book provides a comprehensive, vendor-neutral collection...

Practical PHP and MySQL(R): Building Eight Dynamic Web Applications (Negus Live Linux Series)
Practical PHP and MySQL(R): Building Eight Dynamic Web Applications (Negus Live Linux Series)
Everyone is going nuts about the Web. Ever since we started getting creaky old modems installed in our homes and businesses, the Web has become an increasingly dominant part of our lives. With it we explore, shop, diagnose, entertain, amuse, communicate, collaborate, and more. The Web is no longer a novelty item that the few use to stretch their...

Programming with Microsoft Visual C++ .NET, Sixth Edition (Core Reference)
Programming with Microsoft Visual C++ .NET, Sixth Edition (Core Reference)

The release of the Microsoft Visual Studio .NET (and Visual C++ .NET in particular) has underscored Microsoft’s increasing focus on Internet technologies, which are at the heart of the Microsoft .NET architecture. In addition to supporting the .NET initiative, Visual C++ .NET keeps all the productivity-boosting features...

Sams Teach Yourself Google+ in 10 Minutes (Sams Teach Yourself -- Minutes)
Sams Teach Yourself Google+ in 10 Minutes (Sams Teach Yourself -- Minutes)

Sams Teach Yourself Google™+ in 10 Minutes gives you straightforward, practical answers when you need fast results. Work through its 10-minute lessons to jumpstart your Google+ experience...and then use today’s hottest social network to connect with everyone and everything you care about!  

Families of Conformally Covariant Differential Operators, Q-Curvature and Holography (Progress in Mathematics)
Families of Conformally Covariant Differential Operators, Q-Curvature and Holography (Progress in Mathematics)
The central object of the book is Q-curvature. This important and subtle scalar Riemannian curvature quantity was introduced by Tom Branson about 15 year ago in connection with variational formulas for determinants of conformally covariant differential operators. The book studies structural properties of Q-curvature from an extrinsic point of view...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy