Practical Reverse Engineering

The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more.

Practical Reverse Engineering

Author: Bruce Dang

Publisher: John Wiley & Sons

ISBN: 1118787390

Page: 384

View: 349

Analyzing how hacks are done, so as to stop them in thefuture Reverse engineering is the process of analyzing hardware orsoftware and understanding it, without having access to the sourcecode or design documents. Hackers are able to reverse engineersystems and exploit what they find with scary results. Now the goodguys can use the same tools to thwart these threats. PracticalReverse Engineering goes under the hood of reverse engineeringfor security analysts, security engineers, and system programmers,so they can learn how to use these same processes to stop hackersin their tracks. The book covers x86, x64, and ARM (the first book to cover allthree); Windows kernel-mode code rootkits and drivers; virtualmachine protection techniques; and much more. Best of all, itoffers a systematic approach to the material, with plenty ofhands-on exercises and real-world examples. Offers a systematic approach to understanding reverseengineering, with hands-on exercises and real-world examples Covers x86, x64, and advanced RISC machine (ARM) architecturesas well as deobfuscation and virtual machine protectiontechniques Provides special coverage of Windows kernel-mode code(rootkits/drivers), a topic not often covered elsewhere, andexplains how to analyze drivers step by step Demystifies topics that have a steep learning curve Includes a bonus chapter on reverse engineering tools Practical Reverse Engineering: Using x86, x64, ARM, WindowsKernel, and Reversing Tools provides crucial, up-to-dateguidance for a broad range of IT professionals.

Related Books:

Practical Reverse Engineering
Language: en
Pages: 384
Authors: Bruce Dang, Alexandre Gazet, Elias Bachaalany
Categories: Computers
Type: BOOK - Published: 2014-02-03 - Publisher: John Wiley & Sons

Analyzing how hacks are done, so as to stop them in thefuture Reverse engineering is the process of analyzing hardware orsoftware and understanding it, without having access to the sourcecode or design documents. Hackers are able to reverse engineersystems and exploit what they find with scary results. Now the goodguys
Ransomware: Practical Reverse Engineering
Language: en
Pages:
Authors: Bruce Dang, Alexandre Gazet, Elias Bachaalany
Categories: Computers
Type: BOOK - Published: 2017 - Publisher:

Take an in-depth look at tools and techniques you can use to reverse engineer malware.
Ransomware: Practical Reverse Engineering
Language: en
Pages:
Authors: Malcolm Shore
Categories: Computers
Type: BOOK - Published: 2017 - Publisher:

Books about Ransomware: Practical Reverse Engineering
Reversing
Language: en
Pages: 624
Authors: Eldad Eilam
Categories: Computers
Type: BOOK - Published: 2011-12-12 - Publisher: John Wiley & Sons

Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and
Mastering Reverse Engineering
Language: en
Pages: 384
Authors: Ajay Kumar Tiwari
Categories: Computers
Type: BOOK - Published: 2016-02-08 - Publisher: Createspace Independent Publishing Platform

Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these