Cargando…

Mastering Reverse Engineering : Re-Engineer Your Ethical Hacking Skills.

Reverse engineering is a tool used for analyzing software, to exploit its weaknesses and strengthen its defenses. Hackers use reverse engineering as a tool to expose security flaws and questionable privacy practices. This book helps you to master the art of using reverse engineering.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Wong, Reginald
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing Ltd, 2018.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBSCO_on1064731152
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|---|||||
008 181117s2018 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d MERUC  |d YDX  |d OCLCQ  |d UKAHL  |d RDF  |d OCLCO  |d OCLCF  |d N$T  |d OCLCQ  |d NLW  |d UKMGB  |d OCLCO  |d K6U  |d OCLCQ 
015 |a GBC209302  |2 bnb 
016 7 |a 019121414  |2 Uk 
019 |a 1063762840 
020 |a 1788835298 
020 |a 9781788835299  |q (electronic bk.) 
020 |z 9781788838849  |q print 
029 1 |a AU@  |b 000065065921 
029 1 |a UKMGB  |b 019121414 
029 1 |a AU@  |b 000068892102 
029 1 |a AU@  |b 000069028108 
035 |a (OCoLC)1064731152  |z (OCoLC)1063762840 
037 |a 9781788835299  |b Packt Publishing 
050 4 |a TA168.5  |b .W664 2018 
082 0 4 |a 620.0042  |2 23 
049 |a UAMI 
100 1 |a Wong, Reginald. 
245 1 0 |a Mastering Reverse Engineering :  |b Re-Engineer Your Ethical Hacking Skills. 
260 |a Birmingham :  |b Packt Publishing Ltd,  |c 2018. 
300 |a 1 online resource (423 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Preparing to Reverse; Reverse engineering; Technical requirements; Reverse engineering as a process; Seeking approval; Static analysis; Dynamic analysis; Low-level analysis; Reporting; Tools; Binary analysis tools; Disassemblers; Debuggers; Monitoring tools; Decompilers; Malware handling; Basic analysis lab setup; Our setup; Samples; Summary; Chapter 2: Identification and Extraction of Hidden Components; Technical requirements; The operating system environment; The filesystem; Memory. 
505 8 |a The registry systemTypical malware behavior; Persistence; Run keys; Load and Run values; Startup values; The Image File Execution Options key; Malware delivery; Email; Instant messenger; The computer network; Media storage; Exploits and compromised websites; Software piracy; Malware file properties; Payload -- the evil within; Tools; Autoruns; The Process explorer; Summary; Further reading; Chapter 3: The Low-Level Language; Technical requirements; Binary numbers; Bases; Converting between bases; Binary arithmetic; Signed numbers; x86; Registers; Memory addressing; Endianness. 
505 8 |a Basic instructionsOpcode bytes; Copying data; MOV and LEA; Arithmetic operations; Addition and subtraction; Increment and decrement instructions; Multiplication and division instructions; Other signed operations; Bitwise algebra; Control flow; Stack manipulation; Tools -- builder and debugger; Popular assemblers; MASM; NASM; FASM; x86 Debuggers; WinDbg; Ollydebug; x64dbg; Hello World; Installation of FASM; It works!; Dealing with common errors when building; Dissecting the program ; After Hello; Calling APIs; Common Windows API libraries; Short list of common API functions; Debugging; Summary. 
505 8 |a Further readingChapter 4: Static and Dynamic Reversing; Assessment and static analysis; Static analysis; File types and header analysis; Extracting useful information from file; PEid and TrID; python-magic; file; MASTIFF; Other information; PE executables; Deadlisting; IDA (Interactive Disassembler); Decompilers; ILSpy -- C# Decompiler; Dynamic analysis; Memory regions and the mapping of a process; Process and thread monitoring; Network traffic; Monitoring system changes; Post-execution differences; Debugging; Try it yourself; Summary; References; Chapter 5: Tools of the Trade. 
505 8 |a Analysis environmentsVirtual machines; Windows; Linux; Information gathering tools; File type information; Hash identifying; Strings; Monitoring tools; Default command-line tools; Disassemblers; Debuggers; Decompilers; Network tools; Editing tools; Attack tools; Automation tools; Software forensic tools; Automated dynamic analysis; Online service sites; Summary; Chapter 6: RE in Linux Platforms; Setup; Linux executable -- hello world; dlroW olleH; What have we gathered so far?; Dynamic analysis; Going further with debugging; A better debugger; Setup; Hello World in Radare2. 
500 |a What is the password? 
520 |a Reverse engineering is a tool used for analyzing software, to exploit its weaknesses and strengthen its defenses. Hackers use reverse engineering as a tool to expose security flaws and questionable privacy practices. This book helps you to master the art of using reverse engineering. 
504 |a Includes bibliographical references. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Reverse engineering. 
650 0 |a Software engineering. 
650 6 |a Rétro-ingénierie. 
650 6 |a Génie logiciel. 
650 7 |a Computer security.  |2 bicssc 
650 7 |a Computer viruses, Trojans & worms.  |2 bicssc 
650 7 |a Linux.  |2 bicssc 
650 7 |a Computers  |x Security  |x Viruses.  |2 bisacsh 
650 7 |a Computers  |x Security  |x General.  |2 bisacsh 
650 7 |a Computers  |x Operating Systems  |x Linux.  |2 bisacsh 
650 7 |a Reverse engineering.  |2 fast  |0 (OCoLC)fst01096543 
650 7 |a Software engineering.  |2 fast  |0 (OCoLC)fst01124185 
776 0 8 |i Print version:  |a Wong, Reginald.  |t Mastering Reverse Engineering : Re-Engineer Your Ethical Hacking Skills.  |d Birmingham : Packt Publishing Ltd, ©2018  |z 9781788838849 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1925347  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH35400940 
938 |a EBL - Ebook Library  |b EBLB  |n EBL5573418 
938 |a EBSCOhost  |b EBSC  |n 1925347 
938 |a YBP Library Services  |b YANK  |n 15825626 
994 |a 92  |b IZTAP