Reverse Engineering Code with IDA Pro 在线电子书 图书标签: Reverse.Engineering 逆向工程 计算机系统 计算机技术 汇编 iOS IDA
发表于2024-12-23
Reverse Engineering Code with IDA Pro 在线电子书 pdf 下载 txt下载 epub 下载 mobi 下载 2024
Dan Kaminsky,IOActive公司的渗透测试主管。Dan自1999年起(在去Cisco及Avaya上班前)在安全圈内就非常活跃。使他广为人知的是他在黑帽子大会上一系列的“Black Ops”演讲,此外,他还是唯一一位出席并在每届微软内部训练活动“Blue Hat”上发言的人。Dan致力于设计层面的故障分析,特别针对大规模的网络应用程序。Dan经常收集世界各地互联网的详细健康数据,最近用这些数据检测大部分rootkit在世界各地的繁殖情况。Dan是这个世界上少数几个同时拥有技术专长及执行层咨询技巧和能力的人。
If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pro's interactive interface and programmable development language provide you with complete control over code disassembly and debugging. This is the only book which focuses exclusively on the world's most powerful and popular took for reverse engineering code. Reverse Engineer Real Hostile Code - To follow along with this chapter, you must download a file called! Danger!Infectedmalware!Danger!...'nuff said. Download the Code! The companion Web site to this book offers up really evil code for you to reverse engineer and really nice code for you to automate tasks with the IDC Scripting Language. The title focuses on Portable Executable (PE) and Executable and Linking Formats (ELF). Understand the physical layout of PE and ELF files, and analyze the components that are essential to reverse engineering. Break hostile code armor and write your own Exploits. Understand execution flow, trace functions, recover hard coded passwords, find vulnerable functions, backtrace execution, and craft a buffer overflow. Master Debugging Debug in IDA Pro, use a debugger while reverse engineering, perform heap and stack access modification, and use other debuggers. Stop anti-reversing - Anti-reversing, like reverse engineering or coding in assembly, is an art form. The trick of course is to try to stop the person reversing the application. Find out how! Track a protocol through a binary and recover its message structure. Trace execution flow from a read event, determine the structure of a protocol, determine if the protocol has any undocumented messages, and use IDA Pro to determine the functions that process a particular message. Develop IDA Scripts and Plug-ins. Learn the basics of IDA scripting and syntax, and write IDC scripts and plug-ins to automate even the most complex tasks.
内容应该很好,可读起来很困难,一大堆很别扭的术语(与学的课程中的不一样),应该是翻译的问题. 译者中有学生、职场新人、非研究软件逆向分析的专家。太不专业!出版社很不负责。 如题! 如题! 如题! 如题! 如题! 如题! 如题!如题!如题!如题! 如题!如题!如题!如题! ...
评分对于有一定的逆向工程基础的人来说,只看最后一章就可以了。 最后一章花了100多页讲了IDA的脚本和插件的编写,如果对这些已经很熟悉了的话,就根本不用看这本书了。
评分对于有一定的逆向工程基础的人来说,只看最后一章就可以了。 最后一章花了100多页讲了IDA的脚本和插件的编写,如果对这些已经很熟悉了的话,就根本不用看这本书了。
评分对于有一定的逆向工程基础的人来说,只看最后一章就可以了。 最后一章花了100多页讲了IDA的脚本和插件的编写,如果对这些已经很熟悉了的话,就根本不用看这本书了。
评分内容应该很好,可读起来很困难,一大堆很别扭的术语(与学的课程中的不一样),应该是翻译的问题. 译者中有学生、职场新人、非研究软件逆向分析的专家。太不专业!出版社很不负责。 如题! 如题! 如题! 如题! 如题! 如题! 如题!如题!如题!如题! 如题!如题!如题!如题! ...
Reverse Engineering Code with IDA Pro 在线电子书 pdf 下载 txt下载 epub 下载 mobi 下载 2024