Cargando…

Reverse engineering code with IDA Pro /

If you want to master the art and science of reverse engineering code with IDA Pro for security R & D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Ferguson, Justin, Kaminsky, Dan
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, MA : Syngress Pub., �2008.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocn272383172
003 OCoLC
005 20231117015132.0
006 m o d
007 cr cn|||||||||
008 081117s2008 maua o 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OCLCQ  |d OPELS  |d OCLCQ  |d XFF  |d N$T  |d UBY  |d IDEBK  |d E7B  |d UMI  |d CEF  |d NHM  |d DEBSZ  |d VLB  |d DKDLA  |d YDXCP  |d OCLCQ  |d COO  |d LIV  |d OCLCQ  |d OCLCO  |d OCLCA  |d OCLCF  |d D6H  |d UAB  |d LEAUB  |d OL$  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 233526954  |a 354465246  |a 476037886  |a 505072832  |a 646747350  |a 1032585499  |a 1044218292 
020 |a 9780080558790  |q (electronic bk.) 
020 |a 0080558798  |q (electronic bk.) 
020 |z 9781597492379 
020 |z 159749237X 
035 |a (OCoLC)272383172  |z (OCoLC)233526954  |z (OCoLC)354465246  |z (OCoLC)476037886  |z (OCoLC)505072832  |z (OCoLC)646747350  |z (OCoLC)1032585499  |z (OCoLC)1044218292 
050 4 |a QA76.76.D57  |b R49 2008eb 
072 7 |a COM  |x 051330  |2 bisacsh 
082 0 4 |a 005.1/4  |2 22 
245 0 0 |a Reverse engineering code with IDA Pro /  |c Justin Ferguson ... [et al. ; Dan Kaminsky, technical editor and contributing author]. 
246 1 8 |a RE code with IDA Pro 
260 |a Burlington, MA :  |b Syngress Pub.,  |c �2008. 
300 |a 1 online resource (xii, 316 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a If you want to master the art and science of reverse engineering code with IDA Pro for security R & D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pro's interactive interface and programmable development language provide you with complete control over code disassembly and debugging. This is the only book which focuses exclusively on the world's most powerful and popular took for reverse engineering code. *Reverse Engineer REAL Hostile Code To follow along with this chapter, you must download a file called!DANGER!INFECTEDMALWARE!DANGER! ... 'nuff said. *Download the Code! The companion Web site to this book offers up really evil code for you to reverse engineer and really nice code for you to automate tasks with the IDC Scripting Language. *Portable Executable (PE) and Executable and Linking Formats (ELF) Understand the physical layout of PE and ELF files, and analyze the components that are essential to reverse engineering. *Break Hostile Code Armor and Write your own Exploits Understand execution flow, trace functions, recover hard coded passwords, find vulnerable functions, backtrace execution, and craft a buffer overflow. *Master Debugging Debug in IDA Pro, use a debugger while reverse engineering, perform heap and stack access modification, and use other debuggers. *Stop Anti-Reversing Anti-reversing, like reverse engineering or coding in assembly, is an art form. The trick of course is to try to stop the person reversing the application. Find out how! *Track a Protocol through a Binary and Recover its Message Structure Trace execution flow from a read event, determine the structure of a protocol, determine if the protocol has any undocumented messages, and use IDA Pro to determine the functions that process a particular message. *Develop IDA Scripts and Plug-ins Learn the basics of IDA scripting and syntax, and write IDC scripts and plug-ins to automate even the most complex tasks. 
505 0 |a Chapter 1: Introduction -- Chapter 2: Assembly and Reverse Engineering Basics -- Chapter 3: Portable Executable and Executable and Linking Formats -- Chapter 4: Walkthroughs One and Two -- Chapter 5: Debugging -- Chapter 6: Anti-Reversing -- Chapter 7: Walkthrough Four -- Chapter 8: Advanced Walkthrough -- Chapter 9: IDA Scripting and Plug-ins -- Index. 
500 |a Includes index. 
588 0 |a Print version record. 
630 0 0 |a IDA Pro (Electronic resource) 
650 0 |a Debugging in computer science  |x Computer programs. 
650 0 |a Computer security  |x Computer programs. 
650 0 |a Reverse engineering  |x Computer programs. 
650 6 |a D�ebogueurs.  |0 (CaQQLa)201-0353126 
650 6 |a S�ecurit�e informatique  |0 (CaQQLa)201-0061152  |x Logiciels.  |0 (CaQQLa)201-0378383 
650 6 |a R�etro-ing�enierie  |0 (CaQQLa)201-0259987  |x Logiciels.  |0 (CaQQLa)201-0378383 
650 7 |a COMPUTERS  |x Software Development & Engineering  |x Quality Assurance & Testing.  |2 bisacsh 
630 0 7 |a IDA Pro (Electronic resource)  |2 blmlsh 
630 0 7 |a IDA Pro (Electronic resource)  |2 fast  |0 (OCoLC)fst01784405 
650 7 |a Computer security  |x Computer programs  |2 fast  |0 (OCoLC)fst00872486 
650 7 |a Debugging in computer science  |x Computer programs  |2 fast  |0 (OCoLC)fst00888886 
700 1 |a Ferguson, Justin. 
700 1 |a Kaminsky, Dan. 
776 0 8 |i Print version:  |t Reverse engineering code with IDA Pro.  |d Burlington, MA : Syngress Pub., �2008  |z 159749237X  |z 9781597492379  |w (DLC) 2008273148  |w (OCoLC)171111160 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781597492379  |z Texto completo