[1825 days] Reverse Engineering Code with IDA Pro
[1825 days] Reverse Engineering Code with IDA Pro [1825 days] Reverse Engineering Code with IDA Pro

[1825 days] Reverse Engineering Code with IDA Pro

CHI TIẾT SẢN PHẨM

Mã sản phẩm:
9781597492379
Tồn kho:
Còn hàng
Nhà xuất bản:
Loại bìa:
Page Fidelity
Ngôn ngữ:
English
Tác giả:
IOActive


Special Price 1,370,500 VNĐ

Còn VNĐ nữa bạn sẽ được miễn phí giao hàngTìm hiểu thêm

Thời gian giao hàng Xem thêm

Chính sách đổi trả Xem thêm

Số lượng

If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pro’s interactive interface and programmable development language provide you with complete control over code disassembly and debugging. This is the only book which focuses exclusively on the world’s most powerful and popular took for reverse engineering code.

*Reverse Engineer REAL Hostile Code
To follow along with this chapter, you must download a file called !DANGER!INFECTEDMALWARE!DANGER!... ‘nuff said.
*Download the Code!
The companion Web site to this book offers up really evil code for you to reverse engineer and really nice code for you to automate tasks with the IDC Scripting Language.
*Portable Executable (PE) and Executable and Linking Formats (ELF)
Understand the physical layout of PE and ELF files, and analyze the components that are essential to reverse engineering.
*Break Hostile Code Armor and Write your own Exploits
Understand execution flow, trace functions, recover hard coded passwords, find vulnerable functions, backtrace execution, and craft a buffer overflow.
*Master Debugging
Debug in IDA Pro, use a debugger while reverse engineering, perform heap and stack access modification, and use other debuggers.
*Stop Anti-Reversing
Anti-reversing, like reverse engineering or coding in assembly, is an art form. The trick of course is to try to stop the person reversing the application. Find out how!
*Track a Protocol through a Binary and Recover its Message Structure
Trace execution flow from a read event, determine the structure of a protocol, determine if the protocol has any undocumented messages, and use IDA Pro to determine the functions that process a particular message.
*Develop IDA Scripts and Plug-ins
Learn the basics of IDA scripting and syntax, and write IDC scripts and plug-ins to automate even the most complex tasks.

Sản phẩm liên quan

New
[90 days] Emergency Management and Tactical Response Operations: Bridging the Gap

Is emergency management education undoing an age-old tradition in the American Fire Service? Has the..

728,500 VNĐ

New
[1825 days] Building Robots With Lego Mindstorms

Lego robots! Mindstorms are sweeping the world and fans need to learn how to programme them Lego Min..

1,269,000 VNĐ

New
[1825 days] Homology Effects

Homology Effects offers contributions from an international panel of researchers whose aim has been ..

4,445,000 VNĐ

New
[1825 days] Semiconductor Lasers II: Materials and Structures

This volume presents state-of-the-art information on several important material systems and device s..

3,023,000 VNĐ

New
[1825 days] Grayned v. City of Rockford, 408 U.S. 104

This title is from the Hayes Barton Press "Originals" series, a collection of classic fiction and no..

38,000 VNĐ

New
[1825 days] Pollution Prevention through Process Integration: Systematic Design Tools

The environmental impact of industrial waste is one of the most serious challenges facing the chemic..

3,226,000 VNĐ

New
[1825 days] Developing Brain Behaviour: The Role of Lipids in Infant Formula

Certain long chain polyunsaturated fatty acids (LCPUFAs) are thought to be essential components of t..

3,429,000 VNĐ

New
[1825 days] MicroRNA Methods

MicroRNAs (miRNA) are tiny bits of genetic material that were unknown nearly 10 years ago but now re..

5,080,000 VNĐ

0898536989