Reversing: Secrets of Reverse EngineeringJohn Wiley & Sons, 12 déc. 2011 - 624 pages Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language |
Table des matières
| 3 | |
| 13 | |
| 25 | |
| 30 | |
Windows Fundamentals | 69 |
The Kernel Memory Space | 75 |
Processes and Threads | 83 |
Reversing Tools | 109 |
Reversing Malware | 273 |
Cracking | 307 |
Antireversing Techniques | 327 |
Breaking Protections | 357 |
Beyond Disassembly | 421 |
Decompilation | 457 |
Appendix A Deciphering Code Structures | 479 |
Appendix B Understanding Compiled Arithmetic | 519 |
ILDasm | 115 |
Miscellaneous Reversing Tools | 133 |
Applied Reversing | 139 |
Deciphering File Formats | 199 |
Auditing Program Binaries | 243 |
Deciphering Program Data | 537 |
Citations | 561 |
| 567 | |
Autres éditions - Tout afficher
Expressions et termes fréquents
actually address space algorithm allocated applications assembly language basic binary block buffer bytecode bytes callback caller Chapter compiler components contains copy protection Cryptex data structure debugger decompilation decryption disassembler EAX,EAX element encrypted entry executable file format function hash header high-level language implemented instruction JNZ SHORT jump kernel kernel-mode LEA EAX,DWORD PTR loaded look loop Low-Level Software malicious program malware managed memory address Microsoft module MOV DWORD PTR mov eax MOV EAX,DWORD PTR NetBurst node obfuscation offset OllyDbg operands operating system optimizations password perform platform pointer PTR EBP+8 PUSH EAX PUSH EDI return value reverse engineering Reversing Tools runtime sequence serial number simply SoftICE source code specific stack stored string thread tion typically ULONG user-mode variable virtual machine Win32 API WinDbg Windows NT
