|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBSCO_on1064731152 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
181117s2018 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d MERUC
|d YDX
|d OCLCQ
|d UKAHL
|d RDF
|d OCLCO
|d OCLCF
|d N$T
|d OCLCQ
|d NLW
|d UKMGB
|d OCLCO
|d K6U
|d OCLCQ
|
015 |
|
|
|a GBC209302
|2 bnb
|
016 |
7 |
|
|a 019121414
|2 Uk
|
019 |
|
|
|a 1063762840
|
020 |
|
|
|a 1788835298
|
020 |
|
|
|a 9781788835299
|q (electronic bk.)
|
020 |
|
|
|z 9781788838849
|q print
|
029 |
1 |
|
|a AU@
|b 000065065921
|
029 |
1 |
|
|a UKMGB
|b 019121414
|
029 |
1 |
|
|a AU@
|b 000068892102
|
029 |
1 |
|
|a AU@
|b 000069028108
|
035 |
|
|
|a (OCoLC)1064731152
|z (OCoLC)1063762840
|
037 |
|
|
|a 9781788835299
|b Packt Publishing
|
050 |
|
4 |
|a TA168.5
|b .W664 2018
|
082 |
0 |
4 |
|a 620.0042
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Wong, Reginald.
|
245 |
1 |
0 |
|a Mastering Reverse Engineering :
|b Re-Engineer Your Ethical Hacking Skills.
|
260 |
|
|
|a Birmingham :
|b Packt Publishing Ltd,
|c 2018.
|
300 |
|
|
|a 1 online resource (423 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Preparing to Reverse; Reverse engineering; Technical requirements; Reverse engineering as a process; Seeking approval; Static analysis; Dynamic analysis; Low-level analysis; Reporting; Tools; Binary analysis tools; Disassemblers; Debuggers; Monitoring tools; Decompilers; Malware handling; Basic analysis lab setup; Our setup; Samples; Summary; Chapter 2: Identification and Extraction of Hidden Components; Technical requirements; The operating system environment; The filesystem; Memory.
|
505 |
8 |
|
|a The registry systemTypical malware behavior; Persistence; Run keys; Load and Run values; Startup values; The Image File Execution Options key; Malware delivery; Email; Instant messenger; The computer network; Media storage; Exploits and compromised websites; Software piracy; Malware file properties; Payload -- the evil within; Tools; Autoruns; The Process explorer; Summary; Further reading; Chapter 3: The Low-Level Language; Technical requirements; Binary numbers; Bases; Converting between bases; Binary arithmetic; Signed numbers; x86; Registers; Memory addressing; Endianness.
|
505 |
8 |
|
|a Basic instructionsOpcode bytes; Copying data; MOV and LEA; Arithmetic operations; Addition and subtraction; Increment and decrement instructions; Multiplication and division instructions; Other signed operations; Bitwise algebra; Control flow; Stack manipulation; Tools -- builder and debugger; Popular assemblers; MASM; NASM; FASM; x86 Debuggers; WinDbg; Ollydebug; x64dbg; Hello World; Installation of FASM; It works!; Dealing with common errors when building; Dissecting the program ; After Hello; Calling APIs; Common Windows API libraries; Short list of common API functions; Debugging; Summary.
|
505 |
8 |
|
|a Further readingChapter 4: Static and Dynamic Reversing; Assessment and static analysis; Static analysis; File types and header analysis; Extracting useful information from file; PEid and TrID; python-magic; file; MASTIFF; Other information; PE executables; Deadlisting; IDA (Interactive Disassembler); Decompilers; ILSpy -- C# Decompiler; Dynamic analysis; Memory regions and the mapping of a process; Process and thread monitoring; Network traffic; Monitoring system changes; Post-execution differences; Debugging; Try it yourself; Summary; References; Chapter 5: Tools of the Trade.
|
505 |
8 |
|
|a Analysis environmentsVirtual machines; Windows; Linux; Information gathering tools; File type information; Hash identifying; Strings; Monitoring tools; Default command-line tools; Disassemblers; Debuggers; Decompilers; Network tools; Editing tools; Attack tools; Automation tools; Software forensic tools; Automated dynamic analysis; Online service sites; Summary; Chapter 6: RE in Linux Platforms; Setup; Linux executable -- hello world; dlroW olleH; What have we gathered so far?; Dynamic analysis; Going further with debugging; A better debugger; Setup; Hello World in Radare2.
|
500 |
|
|
|a What is the password?
|
520 |
|
|
|a Reverse engineering is a tool used for analyzing software, to exploit its weaknesses and strengthen its defenses. Hackers use reverse engineering as a tool to expose security flaws and questionable privacy practices. This book helps you to master the art of using reverse engineering.
|
504 |
|
|
|a Includes bibliographical references.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Reverse engineering.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
6 |
|a Rétro-ingénierie.
|
650 |
|
6 |
|a Génie logiciel.
|
650 |
|
7 |
|a Computer security.
|2 bicssc
|
650 |
|
7 |
|a Computer viruses, Trojans & worms.
|2 bicssc
|
650 |
|
7 |
|a Linux.
|2 bicssc
|
650 |
|
7 |
|a Computers
|x Security
|x Viruses.
|2 bisacsh
|
650 |
|
7 |
|a Computers
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computers
|x Operating Systems
|x Linux.
|2 bisacsh
|
650 |
|
7 |
|a Reverse engineering.
|2 fast
|0 (OCoLC)fst01096543
|
650 |
|
7 |
|a Software engineering.
|2 fast
|0 (OCoLC)fst01124185
|
776 |
0 |
8 |
|i Print version:
|a Wong, Reginald.
|t Mastering Reverse Engineering : Re-Engineer Your Ethical Hacking Skills.
|d Birmingham : Packt Publishing Ltd, ©2018
|z 9781788838849
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1925347
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH35400940
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL5573418
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1925347
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15825626
|
994 |
|
|
|a 92
|b IZTAP
|