The Ghidra book: the definitive guide
"The result of more than a decade of research and development within the NSA, the Ghidra platform was developed to address some of the agency's most challenging reverse-engineering problems. With the open-source release of this formerly restricted tool suite, one of the world's most c...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
San Francisco, CA
No Starch Press
[2020]
|
Schlagworte: | |
Online-Zugang: | UER01 Volltext |
Zusammenfassung: | "The result of more than a decade of research and development within the NSA, the Ghidra platform was developed to address some of the agency's most challenging reverse-engineering problems. With the open-source release of this formerly restricted tool suite, one of the world's most capable disassemblers and intuitive decompilers is now in the hands of cybersecurity defenders everywhere -- and The Ghidra Book is the one and only guide you need to master it. In addition to discussing RE techniques useful in analyzing software and malware of all kinds, the book thoroughly introduces Ghidra's components, features, and unique capacity for group collaboration. You'll learn how to: Navigate a disassembly ; Use Ghidra's built-in decompiler to expedite analysis ; Analyze obfuscated binaries ; Extend Ghidra to recognize new data types ; Build new Ghidra analyzers and loaders ; Add support for new processors and instruction sets ; Script Ghidra tasks to automate workflows ; Set up and use a collaborative reverse engineering environment. Designed for beginner and advanced users alike, The Ghidra Book will effectively prepare you to meet the needs and challenges of RE, so you can analyze files like a pro." -- |
Beschreibung: | Includes index |
Beschreibung: | 1 Online-Ressource (600 Seiten) Illustrationen, Diagramme |
ISBN: | 9781718501034 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV046950068 | ||
003 | DE-604 | ||
005 | 20201027 | ||
007 | cr|uuu---uuuuu | ||
008 | 201020s2020 |||| o||u| ||||||eng d | ||
020 | |a 9781718501034 |c online |9 978-1-7185-0103-4 | ||
035 | |a (OCoLC)1220913786 | ||
035 | |a (DE-599)BVBBV046950068 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-29 | ||
082 | 0 | |a 005.1/4 |2 22 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Eagle, Chris |e Verfasser |4 aut | |
245 | 1 | 0 | |a The Ghidra book |b the definitive guide |c by Chris Eagle and Kara Nance |
264 | 1 | |a San Francisco, CA |b No Starch Press |c [2020] | |
300 | |a 1 Online-Ressource (600 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
520 | 3 | |a "The result of more than a decade of research and development within the NSA, the Ghidra platform was developed to address some of the agency's most challenging reverse-engineering problems. With the open-source release of this formerly restricted tool suite, one of the world's most capable disassemblers and intuitive decompilers is now in the hands of cybersecurity defenders everywhere -- and The Ghidra Book is the one and only guide you need to master it. In addition to discussing RE techniques useful in analyzing software and malware of all kinds, the book thoroughly introduces Ghidra's components, features, and unique capacity for group collaboration. You'll learn how to: Navigate a disassembly ; Use Ghidra's built-in decompiler to expedite analysis ; Analyze obfuscated binaries ; Extend Ghidra to recognize new data types ; Build new Ghidra analyzers and loaders ; Add support for new processors and instruction sets ; Script Ghidra tasks to automate workflows ; Set up and use a collaborative reverse engineering environment. Designed for beginner and advanced users alike, The Ghidra Book will effectively prepare you to meet the needs and challenges of RE, so you can analyze files like a pro." -- | |
650 | 0 | 7 | |a Disassembler |0 (DE-588)4817137-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Software |0 (DE-588)4055382-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsanalyse |0 (DE-588)4684292-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Reverse Engineering |0 (DE-588)4391935-2 |2 gnd |9 rswk-swf |
653 | |a Ghidra (Electronic resource) | ||
653 | 0 | |a Disassemblers (Computer programs) | |
653 | 0 | |a Debugging in computer science | |
653 | 0 | |a Computer security / Computer programs | |
653 | 0 | |a Reverse engineering / Computer programs | |
653 | 0 | |a Computer security / Computer programs | |
653 | 0 | |a Debugging in computer science | |
653 | 0 | |a Disassemblers (Computer programs) | |
689 | 0 | 0 | |a Software |0 (DE-588)4055382-6 |D s |
689 | 0 | 1 | |a Disassembler |0 (DE-588)4817137-2 |D s |
689 | 0 | 2 | |a Reverse Engineering |0 (DE-588)4391935-2 |D s |
689 | 0 | 3 | |a Sicherheitsanalyse |0 (DE-588)4684292-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Nance, Kara |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-7185-0102-7 |
856 | 4 | 0 | |u https:// |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032358602 | ||
966 | e | |u https://ebookcentral.proquest.com/lib/erlangen/detail.action?docID=6179895 |l UER01 |p ZDB-30-PQE |q UER_Einzelkauf |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804181861113528320 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Eagle, Chris |
author_facet | Eagle, Chris |
author_role | aut |
author_sort | Eagle, Chris |
author_variant | c e ce |
building | Verbundindex |
bvnumber | BV046950068 |
classification_rvk | ST 276 |
collection | ZDB-30-PQE |
ctrlnum | (OCoLC)1220913786 (DE-599)BVBBV046950068 |
dewey-full | 005.1/4 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.1/4 |
dewey-search | 005.1/4 |
dewey-sort | 15.1 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03383nmm a2200565 c 4500</leader><controlfield tag="001">BV046950068</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20201027 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201020s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781718501034</subfield><subfield code="c">online</subfield><subfield code="9">978-1-7185-0103-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1220913786</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046950068</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.1/4</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Eagle, Chris</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The Ghidra book</subfield><subfield code="b">the definitive guide</subfield><subfield code="c">by Chris Eagle and Kara Nance</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">San Francisco, CA</subfield><subfield code="b">No Starch Press</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (600 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"The result of more than a decade of research and development within the NSA, the Ghidra platform was developed to address some of the agency's most challenging reverse-engineering problems. With the open-source release of this formerly restricted tool suite, one of the world's most capable disassemblers and intuitive decompilers is now in the hands of cybersecurity defenders everywhere -- and The Ghidra Book is the one and only guide you need to master it. In addition to discussing RE techniques useful in analyzing software and malware of all kinds, the book thoroughly introduces Ghidra's components, features, and unique capacity for group collaboration. You'll learn how to: Navigate a disassembly ; Use Ghidra's built-in decompiler to expedite analysis ; Analyze obfuscated binaries ; Extend Ghidra to recognize new data types ; Build new Ghidra analyzers and loaders ; Add support for new processors and instruction sets ; Script Ghidra tasks to automate workflows ; Set up and use a collaborative reverse engineering environment. Designed for beginner and advanced users alike, The Ghidra Book will effectively prepare you to meet the needs and challenges of RE, so you can analyze files like a pro." --</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Disassembler</subfield><subfield code="0">(DE-588)4817137-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsanalyse</subfield><subfield code="0">(DE-588)4684292-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Reverse Engineering</subfield><subfield code="0">(DE-588)4391935-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Ghidra (Electronic resource)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Disassemblers (Computer programs)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Debugging in computer science</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security / Computer programs</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Reverse engineering / Computer programs</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security / Computer programs</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Debugging in computer science</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Disassemblers (Computer programs)</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Disassembler</subfield><subfield code="0">(DE-588)4817137-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Reverse Engineering</subfield><subfield code="0">(DE-588)4391935-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Sicherheitsanalyse</subfield><subfield code="0">(DE-588)4684292-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nance, Kara</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-7185-0102-7</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032358602</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/erlangen/detail.action?docID=6179895</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">UER_Einzelkauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046950068 |
illustrated | Not Illustrated |
index_date | 2024-07-03T15:40:48Z |
indexdate | 2024-07-10T08:58:23Z |
institution | BVB |
isbn | 9781718501034 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032358602 |
oclc_num | 1220913786 |
open_access_boolean | |
owner | DE-29 |
owner_facet | DE-29 |
physical | 1 Online-Ressource (600 Seiten) Illustrationen, Diagramme |
psigel | ZDB-30-PQE ZDB-30-PQE UER_Einzelkauf |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | No Starch Press |
record_format | marc |
spelling | Eagle, Chris Verfasser aut The Ghidra book the definitive guide by Chris Eagle and Kara Nance San Francisco, CA No Starch Press [2020] 1 Online-Ressource (600 Seiten) Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier Includes index "The result of more than a decade of research and development within the NSA, the Ghidra platform was developed to address some of the agency's most challenging reverse-engineering problems. With the open-source release of this formerly restricted tool suite, one of the world's most capable disassemblers and intuitive decompilers is now in the hands of cybersecurity defenders everywhere -- and The Ghidra Book is the one and only guide you need to master it. In addition to discussing RE techniques useful in analyzing software and malware of all kinds, the book thoroughly introduces Ghidra's components, features, and unique capacity for group collaboration. You'll learn how to: Navigate a disassembly ; Use Ghidra's built-in decompiler to expedite analysis ; Analyze obfuscated binaries ; Extend Ghidra to recognize new data types ; Build new Ghidra analyzers and loaders ; Add support for new processors and instruction sets ; Script Ghidra tasks to automate workflows ; Set up and use a collaborative reverse engineering environment. Designed for beginner and advanced users alike, The Ghidra Book will effectively prepare you to meet the needs and challenges of RE, so you can analyze files like a pro." -- Disassembler (DE-588)4817137-2 gnd rswk-swf Software (DE-588)4055382-6 gnd rswk-swf Sicherheitsanalyse (DE-588)4684292-5 gnd rswk-swf Reverse Engineering (DE-588)4391935-2 gnd rswk-swf Ghidra (Electronic resource) Disassemblers (Computer programs) Debugging in computer science Computer security / Computer programs Reverse engineering / Computer programs Software (DE-588)4055382-6 s Disassembler (DE-588)4817137-2 s Reverse Engineering (DE-588)4391935-2 s Sicherheitsanalyse (DE-588)4684292-5 s DE-604 Nance, Kara Sonstige oth Erscheint auch als Druck-Ausgabe 978-1-7185-0102-7 https:// URL des Erstveröffentlichers Volltext |
spellingShingle | Eagle, Chris The Ghidra book the definitive guide Disassembler (DE-588)4817137-2 gnd Software (DE-588)4055382-6 gnd Sicherheitsanalyse (DE-588)4684292-5 gnd Reverse Engineering (DE-588)4391935-2 gnd |
subject_GND | (DE-588)4817137-2 (DE-588)4055382-6 (DE-588)4684292-5 (DE-588)4391935-2 |
title | The Ghidra book the definitive guide |
title_auth | The Ghidra book the definitive guide |
title_exact_search | The Ghidra book the definitive guide |
title_exact_search_txtP | The Ghidra book the definitive guide |
title_full | The Ghidra book the definitive guide by Chris Eagle and Kara Nance |
title_fullStr | The Ghidra book the definitive guide by Chris Eagle and Kara Nance |
title_full_unstemmed | The Ghidra book the definitive guide by Chris Eagle and Kara Nance |
title_short | The Ghidra book |
title_sort | the ghidra book the definitive guide |
title_sub | the definitive guide |
topic | Disassembler (DE-588)4817137-2 gnd Software (DE-588)4055382-6 gnd Sicherheitsanalyse (DE-588)4684292-5 gnd Reverse Engineering (DE-588)4391935-2 gnd |
topic_facet | Disassembler Software Sicherheitsanalyse Reverse Engineering |
url | https:// |
work_keys_str_mv | AT eaglechris theghidrabookthedefinitiveguide AT nancekara theghidrabookthedefinitiveguide |