Reversing Secrets of Reverse Engineering 1st Edition by Eldad Eilam – Ebook PDF Instant Download/Delivery. 0764574817, 9780764574818
Full download Reversing Secrets of Reverse Engineering 1st Edition after payment
Product details:
ISBN 10: 0764574817
ISBN 13: 9780764574818
Author: Eldad Eilam
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor’s software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into “disassembly”-code-level reverse engineering-and explaining how to decipher assembly language
Reversing Secrets of Reverse Engineering 1st Table of contents:
Part I: Reversing 101
Chapter 1: Foundations
What Is Reverse Engineering?
Software Reverse Engineering: Reversing
Reversing Applications
Low-Level Software
The Reversing Process
The Tools
Is Reversing Legal?
Code Samples & Tools
Conclusion
Chapter 2: Low-Level Software
High-Level Perspectives
Low-Level Perspectives
Assembly Language 101
A Primer on Compilers and Compilation
Execution Environments
Conclusion
Chapter 3: Windows Fundamentals
Components and Basic Architecture
Memory Management
Objects and Handles
Processes and Threads
Application Programming Interfaces
Executable Formats
Input and Output
Structured Exception Handling
Conclusion
Chapter 4: Reversing Tools
Different Reversing Approaches
Disassemblers
Debuggers
Decompilers
System-Monitoring Tools
Patching Tools
Miscellaneous Reversing Tools
Conclusion
Part II: Applied Reversing
Chapter 5: Beyond the Documentation
Reversing and Interoperability
Laying the Ground Rules
Locating Undocumented APIs
Case Study: The Generic Table API in NTDLL.DLL
Conclusion
Chapter 6: Deciphering File Formats
Cryptex
Using Cryptex
Reversing Cryptex
The Password Verification Process
Dumping the Directory Layout
The Big Picture
Digging Deeper
Conclusion
Chapter 7: Auditing Program Binaries
Defining the Problem
Vulnerabilities
Case-Study: The IIS Indexing Service Vulnerability
Conclusion
Chapter 8: Reversing Malware
Types of Malware
Sticky Software
Future Malware
Uses of Malware
Malware Vulnerability
Polymorphism
Metamorphism
Establishing a Secure Environment
The Backdoor.Hacarmy.D
The Backdoor.Hacarmy.D: A Command Reference
Conclusion
Part III: Cracking
Chapter 9: Piracy and Copy Protection
Copyrights in the New World
The Social Aspect
Software Piracy
Types of Protection
Advanced Protection Concepts
Digital Rights Management
Watermarking
Trusted Computing
Attacking Copy Protection Technologies
Conclusion
Chapter 10: Antireversing Techniques
Why Antireversing?
Basic Approaches to Antireversing
Eliminating Symbolic Information
Code Encryption
Active Antidebugger Techniques
Confusing Disassemblers
Code Obfuscation
Control Flow Transformations
Data Transformations
Conclusion
Chapter 11: Breaking Protections
Patching
Keygenning
Ripping Key-Generation Algorithms
Advanced Cracking: Defender
Protection Technologies in Defender
Conclusion
Part IV: Beyond Disassembly
Chapter 12: Reversing .NET
Ground Rules
.NET Basics
Intermediate Language (IL)
Decompilers
Obfuscators
Reversing Obfuscated Code
Conclusion
Chapter 13: Decompilation
Native Code Decompilation: An Unsolvable Problem?
Typical Decompiler Architecture
Intermediate Representations
The Front End
Code Analysis
The Back End
Real-World IA-32 Decompilation
Conclusion
Appendix A: Deciphering Code Structures
Understanding Low-Level Logic
Control Flow & Program Layout
Branchless Logic
Effects of Working-Set Tuning on Reversing
Appendix B: Understanding Compiled Arithmetic
Arithmetic Flags
Basic Integer Arithmetic
64-Bit Arithmetic
Type Conversions
Appendix C: Deciphering Program Data
The Stack
Basic Data Constructs
Data Structures
Classes
Appendix D: Citations
People also search for Reversing Secrets of Reverse Engineering 1st:
reversing entries explained
reversing car direction
reversing secrets of reverse engineering
reversing 101