Mastering reverse engineering: re-engineer your ethical hacking skills
Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses. /b h4Key Features/h4 ulliAnalyze and improvise software and hardware with real-world examples /li liLearn advanced debugging and patching techniques w...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham ; Mumbai
Packt
2018
|
Schlagworte: | |
Online-Zugang: | UBY01 |
Zusammenfassung: | Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses. /b h4Key Features/h4 ulliAnalyze and improvise software and hardware with real-world examples /li liLearn advanced debugging and patching techniques with tools such as IDA Pro, x86dbg, and Radare2. /li liExplore modern security techniques to identify, exploit, and avoid cyber threats /li /ul h4Book Description/h4 If you want to analyze software in order to exploit its weaknesses and strengthen its defenses, then you should explore reverse engineering. Reverse Engineering is a hackerfriendly tool used to expose security flaws and questionable privacy practices.In this book, you will learn how to analyse software even without having access to its source code or design documents. You will start off by learning the low-level language used to communicate with the computer and then move on to covering reverse engineering techniques. Next, you will explore analysis techniques using real-world tools such as IDA Pro and x86dbg. As you progress through the chapters, you will walk through use cases encountered in reverse engineering, such as encryption and compression, used to obfuscate code, and how to to identify and overcome anti-debugging and anti-analysis tricks. Lastly, you will learn how to analyse other types of files that contain code. By the end of this book, you will have the confidence to perform reverse engineering. h4What you will learn/h4 ulliLearn core reverse engineering /li liIdentify and extract malware components /li liExplore the tools used for reverse engineering /li liRun programs under non-native operating systems /li liUnderstand binary obfuscation techniques /li liIdentify and analyze anti-debugging and anti-analysis tricks/li/ul h4Who this book is for/h4 If you are a security engineer or analyst or a system programmer and want to use reverse engineering to improve your software and hardware, this is the book for you. You will also find this book useful if you are a developer who wants to explore and learn reverse engineering. Having some programming/shell scripting knowledge is an added advantage |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781788835299 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047069637 | ||
003 | DE-604 | ||
005 | 20220429 | ||
007 | cr|uuu---uuuuu | ||
008 | 201218s2018 |||| o||u| ||||||eng d | ||
020 | |a 9781788835299 |c Online |9 978-1-78883-529-9 | ||
035 | |a (ZDB-4-NLEBK)1925347 | ||
035 | |a (OCoLC)1227478745 | ||
035 | |a (DE-599)BVBBV047069637 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
100 | 1 | |a Wong, Reginald |e Verfasser |4 aut | |
245 | 1 | 0 | |a Mastering reverse engineering |b re-engineer your ethical hacking skills |c Wong, Reginald |
264 | 1 | |a Birmingham ; Mumbai |b Packt |c 2018 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses. /b h4Key Features/h4 ulliAnalyze and improvise software and hardware with real-world examples /li liLearn advanced debugging and patching techniques with tools such as IDA Pro, x86dbg, and Radare2. /li liExplore modern security techniques to identify, exploit, and avoid cyber threats /li /ul h4Book Description/h4 If you want to analyze software in order to exploit its weaknesses and strengthen its defenses, then you should explore reverse engineering. Reverse Engineering is a hackerfriendly tool used to expose security flaws and questionable privacy practices.In this book, you will learn how to analyse software even without having access to its source code or design documents. You will start off by learning the low-level language used to communicate with the computer and then move on to covering reverse engineering techniques. | ||
520 | |a Next, you will explore analysis techniques using real-world tools such as IDA Pro and x86dbg. As you progress through the chapters, you will walk through use cases encountered in reverse engineering, such as encryption and compression, used to obfuscate code, and how to to identify and overcome anti-debugging and anti-analysis tricks. Lastly, you will learn how to analyse other types of files that contain code. By the end of this book, you will have the confidence to perform reverse engineering. | ||
520 | |a h4What you will learn/h4 ulliLearn core reverse engineering /li liIdentify and extract malware components /li liExplore the tools used for reverse engineering /li liRun programs under non-native operating systems /li liUnderstand binary obfuscation techniques /li liIdentify and analyze anti-debugging and anti-analysis tricks/li/ul h4Who this book is for/h4 If you are a security engineer or analyst or a system programmer and want to use reverse engineering to improve your software and hardware, this is the book for you. You will also find this book useful if you are a developer who wants to explore and learn reverse engineering. Having some programming/shell scripting knowledge is an added advantage | ||
650 | 4 | |a COMPUTERS / Security / General | |
650 | 4 | |a COMPUTERS / Security / Viruses & | |
650 | 4 | |a Malware | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781788838849 |
912 | |a ZDB-4-NLEBK | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032476663 | ||
966 | e | |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1925347 |l UBY01 |p ZDB-4-NLEBK |q UBY01_DDA22 |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182071684366336 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Wong, Reginald |
author_facet | Wong, Reginald |
author_role | aut |
author_sort | Wong, Reginald |
author_variant | r w rw |
building | Verbundindex |
bvnumber | BV047069637 |
collection | ZDB-4-NLEBK |
ctrlnum | (ZDB-4-NLEBK)1925347 (OCoLC)1227478745 (DE-599)BVBBV047069637 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03426nmm a2200373zc 4500</leader><controlfield tag="001">BV047069637</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220429 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201218s2018 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788835299</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-78883-529-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-NLEBK)1925347</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1227478745</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047069637</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wong, Reginald</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mastering reverse engineering</subfield><subfield code="b">re-engineer your ethical hacking skills</subfield><subfield code="c">Wong, Reginald</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham ; Mumbai</subfield><subfield code="b">Packt</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses. /b h4Key Features/h4 ulliAnalyze and improvise software and hardware with real-world examples /li liLearn advanced debugging and patching techniques with tools such as IDA Pro, x86dbg, and Radare2. /li liExplore modern security techniques to identify, exploit, and avoid cyber threats /li /ul h4Book Description/h4 If you want to analyze software in order to exploit its weaknesses and strengthen its defenses, then you should explore reverse engineering. Reverse Engineering is a hackerfriendly tool used to expose security flaws and questionable privacy practices.In this book, you will learn how to analyse software even without having access to its source code or design documents. You will start off by learning the low-level language used to communicate with the computer and then move on to covering reverse engineering techniques. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Next, you will explore analysis techniques using real-world tools such as IDA Pro and x86dbg. As you progress through the chapters, you will walk through use cases encountered in reverse engineering, such as encryption and compression, used to obfuscate code, and how to to identify and overcome anti-debugging and anti-analysis tricks. Lastly, you will learn how to analyse other types of files that contain code. By the end of this book, you will have the confidence to perform reverse engineering. </subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">h4What you will learn/h4 ulliLearn core reverse engineering /li liIdentify and extract malware components /li liExplore the tools used for reverse engineering /li liRun programs under non-native operating systems /li liUnderstand binary obfuscation techniques /li liIdentify and analyze anti-debugging and anti-analysis tricks/li/ul h4Who this book is for/h4 If you are a security engineer or analyst or a system programmer and want to use reverse engineering to improve your software and hardware, this is the book for you. You will also find this book useful if you are a developer who wants to explore and learn reverse engineering. Having some programming/shell scripting knowledge is an added advantage</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / Viruses &amp</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Malware</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781788838849</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-NLEBK</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032476663</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1925347</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-4-NLEBK</subfield><subfield code="q">UBY01_DDA22</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047069637 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:13:33Z |
indexdate | 2024-07-10T09:01:43Z |
institution | BVB |
isbn | 9781788835299 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032476663 |
oclc_num | 1227478745 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 Online-Ressource |
psigel | ZDB-4-NLEBK ZDB-4-NLEBK UBY01_DDA22 |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Packt |
record_format | marc |
spelling | Wong, Reginald Verfasser aut Mastering reverse engineering re-engineer your ethical hacking skills Wong, Reginald Birmingham ; Mumbai Packt 2018 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses. /b h4Key Features/h4 ulliAnalyze and improvise software and hardware with real-world examples /li liLearn advanced debugging and patching techniques with tools such as IDA Pro, x86dbg, and Radare2. /li liExplore modern security techniques to identify, exploit, and avoid cyber threats /li /ul h4Book Description/h4 If you want to analyze software in order to exploit its weaknesses and strengthen its defenses, then you should explore reverse engineering. Reverse Engineering is a hackerfriendly tool used to expose security flaws and questionable privacy practices.In this book, you will learn how to analyse software even without having access to its source code or design documents. You will start off by learning the low-level language used to communicate with the computer and then move on to covering reverse engineering techniques. Next, you will explore analysis techniques using real-world tools such as IDA Pro and x86dbg. As you progress through the chapters, you will walk through use cases encountered in reverse engineering, such as encryption and compression, used to obfuscate code, and how to to identify and overcome anti-debugging and anti-analysis tricks. Lastly, you will learn how to analyse other types of files that contain code. By the end of this book, you will have the confidence to perform reverse engineering. h4What you will learn/h4 ulliLearn core reverse engineering /li liIdentify and extract malware components /li liExplore the tools used for reverse engineering /li liRun programs under non-native operating systems /li liUnderstand binary obfuscation techniques /li liIdentify and analyze anti-debugging and anti-analysis tricks/li/ul h4Who this book is for/h4 If you are a security engineer or analyst or a system programmer and want to use reverse engineering to improve your software and hardware, this is the book for you. You will also find this book useful if you are a developer who wants to explore and learn reverse engineering. Having some programming/shell scripting knowledge is an added advantage COMPUTERS / Security / General COMPUTERS / Security / Viruses & Malware Erscheint auch als Druck-Ausgabe 9781788838849 |
spellingShingle | Wong, Reginald Mastering reverse engineering re-engineer your ethical hacking skills COMPUTERS / Security / General COMPUTERS / Security / Viruses & Malware |
title | Mastering reverse engineering re-engineer your ethical hacking skills |
title_auth | Mastering reverse engineering re-engineer your ethical hacking skills |
title_exact_search | Mastering reverse engineering re-engineer your ethical hacking skills |
title_exact_search_txtP | Mastering reverse engineering re-engineer your ethical hacking skills |
title_full | Mastering reverse engineering re-engineer your ethical hacking skills Wong, Reginald |
title_fullStr | Mastering reverse engineering re-engineer your ethical hacking skills Wong, Reginald |
title_full_unstemmed | Mastering reverse engineering re-engineer your ethical hacking skills Wong, Reginald |
title_short | Mastering reverse engineering |
title_sort | mastering reverse engineering re engineer your ethical hacking skills |
title_sub | re-engineer your ethical hacking skills |
topic | COMPUTERS / Security / General COMPUTERS / Security / Viruses & Malware |
topic_facet | COMPUTERS / Security / General COMPUTERS / Security / Viruses & Malware |
work_keys_str_mv | AT wongreginald masteringreverseengineeringreengineeryourethicalhackingskills |