logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Reverse Engineering Code With Ida Pro Justin Ferguson Dan Kaminsky

  • SKU: BELL-56932432
Reverse Engineering Code With Ida Pro Justin Ferguson Dan Kaminsky
$ 31.00 $ 45.00 (-31%)

4.8

24 reviews

Reverse Engineering Code With Ida Pro Justin Ferguson Dan Kaminsky instant download after payment.

Publisher: Syngress
File Extension: PDF
File size: 9.04 MB
Author: Justin Ferguson & Dan Kaminsky
ISBN: 9781597492379, 159749237X
Language: English
Year: 2008

Product desciption

Reverse Engineering Code With Ida Pro Justin Ferguson Dan Kaminsky by Justin Ferguson & Dan Kaminsky 9781597492379, 159749237X instant download after payment.

If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pro's interactive interface and programmable development language provide you with complete control over code disassembly and debugging. This is the only book which focuses exclusively on the world's most powerful and popular took for reverse engineering code.*Reverse Engineer REAL Hostile CodeTo follow along with this chapter, you must download a file called !DANGER!INFECTEDMALWARE!DANGER!... 'nuff said.*Download the Code!The companion Web site to this book offers up really evil code for you to reverse engineer and really nice code for you to automate tasks with the IDC Scripting Language.*Portable Executable (PE) and Executable and Linking Formats (ELF)Understand the physical layout of PE and ELF files, and analyze the components that are essential to reverse engineering.*Break Hostile Code Armor and Write your own ExploitsUnderstand execution flow, trace functions, recover hard coded passwords, find vulnerable functions, backtrace execution, and craft a buffer overflow.*Master DebuggingDebug in IDA Pro, use a debugger while reverse engineering, perform heap and stack access modification, and use other debuggers.*Stop Anti-ReversingAnti-reversing, like reverse engineering or coding in assembly, is an art form. The trick of course is to try to stop the person reversing the application. Find out how!*Track a Protocol through a Binary and Recover its Message StructureTrace execution flow from a read event, determine the structure of a protocol, determine if the protocol has any undocumented messages, and use IDA Pro to determine the functions that process a particular message.*Develop IDA Scripts and Plug-insLearn the basics of IDA scripting and syntax, and write IDC scripts and plug-ins to automate even the most complex tasks.
ISBN : 9781597492379

Related Products