Reverse engineering code with IDA Pro:
If you want to master the art and science of reverse engineering code with IDA Pro for security R & D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and...
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Burlington, MA
Syngress Pub.
© 2008
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | If you want to master the art and science of reverse engineering code with IDA Pro for security R & D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pro's interactive interface and programmable development language provide you with complete control over code disassembly and debugging. This is the only book which focuses exclusively on the world's most powerful and popular took for reverse engineering code. *Reverse Engineer REAL Hostile Code To follow along with this chapter, you must download a file called!DANGER!INFECTEDMALWARE!DANGER! ... 'nuff said. *Download the Code! The companion Web site to this book offers up really evil code for you to reverse engineer and really nice code for you to automate tasks with the IDC Scripting Language. *Portable Executable (PE) and Executable and Linking Formats (ELF) Understand the physical layout of PE and ELF files, and analyze the components that are essential to reverse engineering. *Break Hostile Code Armor and Write your own Exploits Understand execution flow, trace functions, recover hard coded passwords, find vulnerable functions, backtrace execution, and craft a buffer overflow. *Master Debugging Debug in IDA Pro, use a debugger while reverse engineering, perform heap and stack access modification, and use other debuggers. *Stop Anti-Reversing Anti-reversing, like reverse engineering or coding in assembly, is an art form. The trick of course is to try to stop the person reversing the application. Find out how! *Track a Protocol through a Binary and Recover its Message Structure Trace execution flow from a read event, determine the structure of a protocol, determine if the protocol has any undocumented messages, and use IDA Pro to determine the functions that process a particular message. *Develop IDA Scripts and Plug-ins Learn the basics of IDA scripting and syntax, and write IDC scripts and plug-ins to automate even the most complex tasks |
Beschreibung: | Includes index Paralleltitel: RE code with IDA Pro |
Beschreibung: | 1 online resource (xii, 316 pages) illustrations |
ISBN: | 9780080558790 0080558798 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046124782 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2008 |||| o||u| ||||||eng d | ||
020 | |a 9780080558790 |9 978-0-08-055879-0 | ||
020 | |a 0080558798 |9 0-08-055879-8 | ||
035 | |a (ZDB-33-ESD)ocn272383172 | ||
035 | |a (OCoLC)272383172 | ||
035 | |a (DE-599)BVBBV046124782 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.1/4 |2 22 | |
245 | 1 | 0 | |a Reverse engineering code with IDA Pro |c Justin Ferguson ... [et al. ; Dan Kaminsky, technical editor and contributing author] |
246 | 1 | 3 | |a RE code with IDA Pro |
264 | 1 | |a Burlington, MA |b Syngress Pub. |c © 2008 | |
300 | |a 1 online resource (xii, 316 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Paralleltitel: RE code with IDA Pro | ||
520 | |a If you want to master the art and science of reverse engineering code with IDA Pro for security R & D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pro's interactive interface and programmable development language provide you with complete control over code disassembly and debugging. This is the only book which focuses exclusively on the world's most powerful and popular took for reverse engineering code. *Reverse Engineer REAL Hostile Code To follow along with this chapter, you must download a file called!DANGER!INFECTEDMALWARE!DANGER! ... 'nuff said. *Download the Code! The companion Web site to this book offers up really evil code for you to reverse engineer and really nice code for you to automate tasks with the IDC Scripting Language. | ||
520 | |a *Portable Executable (PE) and Executable and Linking Formats (ELF) Understand the physical layout of PE and ELF files, and analyze the components that are essential to reverse engineering. *Break Hostile Code Armor and Write your own Exploits Understand execution flow, trace functions, recover hard coded passwords, find vulnerable functions, backtrace execution, and craft a buffer overflow. *Master Debugging Debug in IDA Pro, use a debugger while reverse engineering, perform heap and stack access modification, and use other debuggers. *Stop Anti-Reversing Anti-reversing, like reverse engineering or coding in assembly, is an art form. The trick of course is to try to stop the person reversing the application. | ||
520 | |a Find out how! *Track a Protocol through a Binary and Recover its Message Structure Trace execution flow from a read event, determine the structure of a protocol, determine if the protocol has any undocumented messages, and use IDA Pro to determine the functions that process a particular message. *Develop IDA Scripts and Plug-ins Learn the basics of IDA scripting and syntax, and write IDC scripts and plug-ins to automate even the most complex tasks | ||
630 | 0 | 4 | |a IDA Pro (Electronic resource) |
650 | 7 | |a IDA Pro (Electronic resource) |2 blmlsh | |
650 | 7 | |a IDA Pro (Electronic resource) |2 fast | |
650 | 7 | |a COMPUTERS / Software Development & Engineering / Quality Assurance & Testing |2 bisacsh | |
650 | 7 | |a Computer security / Computer programs |2 fast | |
650 | 7 | |a Debugging in computer science / Computer programs |2 fast | |
650 | 4 | |a Debugging in computer science |x Computer programs | |
650 | 4 | |a Computer security |x Computer programs | |
650 | 4 | |a Reverse engineering |x Computer programs | |
700 | 1 | |a Ferguson, Justin |e Sonstige |4 oth | |
700 | 1 | |a Kaminsky, Dan |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 159749237X |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781597492379 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597492379 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031505236 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781597492379 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180443166146560 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV046124782 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn272383172 (OCoLC)272383172 (DE-599)BVBBV046124782 |
dewey-full | 005.1/4 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.1/4 |
dewey-search | 005.1/4 |
dewey-sort | 15.1 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04170nmm a2200529zc 4500</leader><controlfield tag="001">BV046124782</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2008 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080558790</subfield><subfield code="9">978-0-08-055879-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080558798</subfield><subfield code="9">0-08-055879-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn272383172</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)272383172</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046124782</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.1/4</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Reverse engineering code with IDA Pro</subfield><subfield code="c">Justin Ferguson ... [et al. ; Dan Kaminsky, technical editor and contributing author]</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">RE code with IDA Pro</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">© 2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xii, 316 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Paralleltitel: RE code with IDA Pro</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">If you want to master the art and science of reverse engineering code with IDA Pro for security R & D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pro's interactive interface and programmable development language provide you with complete control over code disassembly and debugging. This is the only book which focuses exclusively on the world's most powerful and popular took for reverse engineering code. *Reverse Engineer REAL Hostile Code To follow along with this chapter, you must download a file called!DANGER!INFECTEDMALWARE!DANGER! ... 'nuff said. *Download the Code! The companion Web site to this book offers up really evil code for you to reverse engineer and really nice code for you to automate tasks with the IDC Scripting Language. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">*Portable Executable (PE) and Executable and Linking Formats (ELF) Understand the physical layout of PE and ELF files, and analyze the components that are essential to reverse engineering. *Break Hostile Code Armor and Write your own Exploits Understand execution flow, trace functions, recover hard coded passwords, find vulnerable functions, backtrace execution, and craft a buffer overflow. *Master Debugging Debug in IDA Pro, use a debugger while reverse engineering, perform heap and stack access modification, and use other debuggers. *Stop Anti-Reversing Anti-reversing, like reverse engineering or coding in assembly, is an art form. The trick of course is to try to stop the person reversing the application. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Find out how! *Track a Protocol through a Binary and Recover its Message Structure Trace execution flow from a read event, determine the structure of a protocol, determine if the protocol has any undocumented messages, and use IDA Pro to determine the functions that process a particular message. *Develop IDA Scripts and Plug-ins Learn the basics of IDA scripting and syntax, and write IDC scripts and plug-ins to automate even the most complex tasks</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">IDA Pro (Electronic resource)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">IDA Pro (Electronic resource)</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">IDA Pro (Electronic resource)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Software Development & Engineering / Quality Assurance & Testing</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / Computer programs</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Debugging in computer science / Computer programs</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Debugging in computer science</subfield><subfield code="x">Computer programs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Computer programs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Reverse engineering</subfield><subfield code="x">Computer programs</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ferguson, Justin</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kaminsky, Dan</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">159749237X</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597492379</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597492379</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031505236</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597492379</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046124782 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:50Z |
institution | BVB |
isbn | 9780080558790 0080558798 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031505236 |
oclc_num | 272383172 |
open_access_boolean | |
physical | 1 online resource (xii, 316 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Reverse engineering code with IDA Pro Justin Ferguson ... [et al. ; Dan Kaminsky, technical editor and contributing author] RE code with IDA Pro Burlington, MA Syngress Pub. © 2008 1 online resource (xii, 316 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Includes index Paralleltitel: RE code with IDA Pro If you want to master the art and science of reverse engineering code with IDA Pro for security R & D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pro's interactive interface and programmable development language provide you with complete control over code disassembly and debugging. This is the only book which focuses exclusively on the world's most powerful and popular took for reverse engineering code. *Reverse Engineer REAL Hostile Code To follow along with this chapter, you must download a file called!DANGER!INFECTEDMALWARE!DANGER! ... 'nuff said. *Download the Code! The companion Web site to this book offers up really evil code for you to reverse engineer and really nice code for you to automate tasks with the IDC Scripting Language. *Portable Executable (PE) and Executable and Linking Formats (ELF) Understand the physical layout of PE and ELF files, and analyze the components that are essential to reverse engineering. *Break Hostile Code Armor and Write your own Exploits Understand execution flow, trace functions, recover hard coded passwords, find vulnerable functions, backtrace execution, and craft a buffer overflow. *Master Debugging Debug in IDA Pro, use a debugger while reverse engineering, perform heap and stack access modification, and use other debuggers. *Stop Anti-Reversing Anti-reversing, like reverse engineering or coding in assembly, is an art form. The trick of course is to try to stop the person reversing the application. Find out how! *Track a Protocol through a Binary and Recover its Message Structure Trace execution flow from a read event, determine the structure of a protocol, determine if the protocol has any undocumented messages, and use IDA Pro to determine the functions that process a particular message. *Develop IDA Scripts and Plug-ins Learn the basics of IDA scripting and syntax, and write IDC scripts and plug-ins to automate even the most complex tasks IDA Pro (Electronic resource) IDA Pro (Electronic resource) blmlsh IDA Pro (Electronic resource) fast COMPUTERS / Software Development & Engineering / Quality Assurance & Testing bisacsh Computer security / Computer programs fast Debugging in computer science / Computer programs fast Debugging in computer science Computer programs Computer security Computer programs Reverse engineering Computer programs Ferguson, Justin Sonstige oth Kaminsky, Dan Sonstige oth Erscheint auch als Druck-Ausgabe 159749237X Erscheint auch als Druck-Ausgabe 9781597492379 http://www.sciencedirect.com/science/book/9781597492379 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Reverse engineering code with IDA Pro IDA Pro (Electronic resource) IDA Pro (Electronic resource) blmlsh IDA Pro (Electronic resource) fast COMPUTERS / Software Development & Engineering / Quality Assurance & Testing bisacsh Computer security / Computer programs fast Debugging in computer science / Computer programs fast Debugging in computer science Computer programs Computer security Computer programs Reverse engineering Computer programs |
title | Reverse engineering code with IDA Pro |
title_alt | RE code with IDA Pro |
title_auth | Reverse engineering code with IDA Pro |
title_exact_search | Reverse engineering code with IDA Pro |
title_full | Reverse engineering code with IDA Pro Justin Ferguson ... [et al. ; Dan Kaminsky, technical editor and contributing author] |
title_fullStr | Reverse engineering code with IDA Pro Justin Ferguson ... [et al. ; Dan Kaminsky, technical editor and contributing author] |
title_full_unstemmed | Reverse engineering code with IDA Pro Justin Ferguson ... [et al. ; Dan Kaminsky, technical editor and contributing author] |
title_short | Reverse engineering code with IDA Pro |
title_sort | reverse engineering code with ida pro |
topic | IDA Pro (Electronic resource) IDA Pro (Electronic resource) blmlsh IDA Pro (Electronic resource) fast COMPUTERS / Software Development & Engineering / Quality Assurance & Testing bisacsh Computer security / Computer programs fast Debugging in computer science / Computer programs fast Debugging in computer science Computer programs Computer security Computer programs Reverse engineering Computer programs |
topic_facet | IDA Pro (Electronic resource) COMPUTERS / Software Development & Engineering / Quality Assurance & Testing Computer security / Computer programs Debugging in computer science / Computer programs Debugging in computer science Computer programs Computer security Computer programs Reverse engineering Computer programs |
url | http://www.sciencedirect.com/science/book/9781597492379 |
work_keys_str_mv | AT fergusonjustin reverseengineeringcodewithidapro AT kaminskydan reverseengineeringcodewithidapro AT fergusonjustin recodewithidapro AT kaminskydan recodewithidapro |