Mastering Reverse Engineering: Re-engineer your ethical hacking skills

If you want to analyze software in order to exploit its weaknesses and strengthen its defenses, then you should explore reverse engineering. Reverse Engineering is a hackerfriendly tool used to expose security flaws and questionable privacy practices.In this book, you will learn how to analyse software even without having access to its source code or design documents. You will start off by learning the low-level language used to communicate with the computer and then move on to covering reverse engineering techniques. Next, you will explore analysis techniques using real-world tools such as IDA Pro and x86dbg. As you progress through the chapters, you will walk through use cases encountered in reverse engineering, such as encryption and compression, used to obfuscate code, and how to to identify and overcome anti-debugging and anti-analysis tricks. Lastly, you will learn how to analyse other types of files that contain code.
By the end of this book, you will have the confidence to perform reverse engineering.

1129814565
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

If you want to analyze software in order to exploit its weaknesses and strengthen its defenses, then you should explore reverse engineering. Reverse Engineering is a hackerfriendly tool used to expose security flaws and questionable privacy practices.In this book, you will learn how to analyse software even without having access to its source code or design documents. You will start off by learning the low-level language used to communicate with the computer and then move on to covering reverse engineering techniques. Next, you will explore analysis techniques using real-world tools such as IDA Pro and x86dbg. As you progress through the chapters, you will walk through use cases encountered in reverse engineering, such as encryption and compression, used to obfuscate code, and how to to identify and overcome anti-debugging and anti-analysis tricks. Lastly, you will learn how to analyse other types of files that contain code.
By the end of this book, you will have the confidence to perform reverse engineering.

39.99 In Stock
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Mastering Reverse Engineering: Re-engineer your ethical hacking skills

by Reginald Wong
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Mastering Reverse Engineering: Re-engineer your ethical hacking skills

by Reginald Wong

eBook

$39.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

If you want to analyze software in order to exploit its weaknesses and strengthen its defenses, then you should explore reverse engineering. Reverse Engineering is a hackerfriendly tool used to expose security flaws and questionable privacy practices.In this book, you will learn how to analyse software even without having access to its source code or design documents. You will start off by learning the low-level language used to communicate with the computer and then move on to covering reverse engineering techniques. Next, you will explore analysis techniques using real-world tools such as IDA Pro and x86dbg. As you progress through the chapters, you will walk through use cases encountered in reverse engineering, such as encryption and compression, used to obfuscate code, and how to to identify and overcome anti-debugging and anti-analysis tricks. Lastly, you will learn how to analyse other types of files that contain code.
By the end of this book, you will have the confidence to perform reverse engineering.


Product Details

ISBN-13: 9781788835299
Publisher: Packt Publishing
Publication date: 10/31/2018
Sold by: Barnes & Noble
Format: eBook
Pages: 436
File size: 13 MB
Note: This product may take a few minutes to download.

About the Author

Reginald Wong has been in the software security industry for more than 15 years.Currently, Reggie is a lead anti-malware researcher at Vipre Security, a J2 Global company, covering various security technologies focused on attacks and malware. He previously worked for Trend Micro as the lead for the Heuristics team, dealing with forward-looking malware detection. Aside from his core work, he has also conducted in-house anti-malware training for fresh graduates. He is currently affiliated with CSPCert.ph, Philippines' CERT, and is a reporter for Wildlist.org. He has also been invited to speak at local security events,including Rootcon.

Table of Contents

Table of Contents
  1. Preparing to Reverse
  2. Identification and extraction of hidden components
  3. The Low-Level Language
  4. Static and Dynamic Reversing
  5. Tools of the trade
  6. RE in Linux platforms
  7. RE in Windows platforms
  8. Sandboxing: Virtualization as a component for RE
  9. Binary Obfuscation Techniques
  10. Packing and Encryption
  11. Anti-analysis Tricks
  12. Practical Reverse Engineering of a Windows Executable
  13. Reversing various File-types
From the B&N Reads Blog

Customer Reviews