Ghidra software reverse engineering for beginners :: analyze, identify, and avoid malicious code and potential threats in your networks and systems /
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing, Ltd.,
2020.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | 1 online resource |
ISBN: | 9781800201842 1800201842 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1229917938 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 210109t20202020enk o 000 0 eng d | ||
040 | |a EBLCP |b eng |e rda |e pn |c EBLCP |d UKAHL |d NLW |d N$T |d OCLCO |d YDX |d OCLCF |d OCLCQ |d DST |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d TMA |d OCLCQ | ||
019 | |a 1255678721 | ||
020 | |a 9781800201842 |q (electronic book) | ||
020 | |a 1800201842 |q (electronic book) | ||
020 | |z 1800207972 | ||
020 | |z 9781800207974 | ||
035 | |a (OCoLC)1229917938 |z (OCoLC)1255678721 | ||
050 | 4 | |a QA76.76.O62 |b D38 2020 | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a David, A. P., |e author. | |
245 | 1 | 0 | |a Ghidra software reverse engineering for beginners : |b analyze, identify, and avoid malicious code and potential threats in your networks and systems / |c A.P. David. |
264 | 1 | |a Birmingham : |b Packt Publishing, Ltd., |c 2020. | |
264 | 4 | |c ©2020 | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
505 | 8 | |a Cover -- Title Page -- Copyright and Credits -- Dedicated -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Introduction to Ghidra -- Chapter 1: Getting Started with Ghidra -- Technical requirements -- WikiLeaks Vault 7 -- NSA release -- Ghidra versus IDA and many other competitors -- Ghidra overview -- Installing Ghidra -- Overview of Ghidra's features -- Summary -- Questions -- Chapter 2: Automating RE Tasks with Ghidra Scripts -- Technical requirements -- Using and adapting existing scripts -- The script class -- Script development -- Summary -- Questions | |
505 | 8 | |a Chapter 3: Ghidra Debug Mode -- Technical requirements -- Setting up the Ghidra development environment -- Overviewing the software requirements -- Installing the Java JDK -- Installing the Eclipse IDE -- Installing PyDev -- Installing GhidraDev -- Debugging the Ghidra code and Ghidra scripts -- Debugging Ghidra scripts from Eclipse -- Debugging any Ghidra component from Eclipse -- Ghidra RCE vulnerability -- Explaining the Ghidra RCE vulnerability -- Exploiting the Ghidra RCE vulnerability -- Fixing the Ghidra RCE vulnerability -- Looking for vulnerable computers -- Summary -- Questions | |
505 | 8 | |a Further reading -- Chapter 4: Using Ghidra Extensions -- Technical requirements -- Installing existing Ghidra extensions -- Analyzing the code of the Sample Table Provider plugin -- Understanding the Ghidra extension skeleton -- Analyzers -- Filesystems -- Plugins -- Exporters -- Loaders -- Developing a Ghidra extension -- Summary -- Questions -- Further reading -- Section 2: Reverse Engineering -- Chapter 5: Reversing Malware Using Ghidra -- Technical requirements -- Setting up the environment -- Looking for malware indicators -- Looking for strings | |
505 | 8 | |a Intelligence information and external sources -- Checking import functions -- Dissecting interesting malware sample parts -- The entry point function -- Analyzing the 0x00453340 function -- Analyzing the 0x00453C10 function -- Analyzing the 0x0046EA60 function -- Analyzing the 0x0046BEB0 function -- Analyzing the 0x0046E3A0 function -- Analyzing the 0x004559B0 function -- Analyzing the 0x004554E0 function -- Analyzing the 0x0046C860 function -- Analyzing the 0x0046A100 function -- Summary -- Questions -- Further reading -- Chapter 6: Scripting Malware Analysis -- Technical requirements | |
505 | 8 | |a Using the Ghidra scripting API -- Writing scripts using the Java programming language -- Writing scripts using the Python programming language -- Deobfuscating malware samples using scripts -- The delta offset -- Translating API hashes to addresses -- Deobfuscating the hash table using Ghidra scripting -- Improving the scripting results -- Summary -- Questions -- Further reading -- Chapter 7: Using Ghidra Headless Analyzer -- Technical requirements -- Why use headless mode? -- Creating and populating projects -- Performing analysis on imported or existing binaries | |
505 | 8 | |a Running non-GUI scripts in a project. | |
588 | 0 | |a Online resource; title from digital title page (viewed on June 13, 2021). | |
650 | 0 | |a Open source software. |0 http://id.loc.gov/authorities/subjects/sh99003437 | |
650 | 0 | |a Reverse engineering. |0 http://id.loc.gov/authorities/subjects/sh93004214 | |
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Logiciels libres. | |
650 | 6 | |a Rétro-ingénierie. | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a COMPUTERS |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Bioinformatics. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Buyer's Guides. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Open source software |2 fast | |
650 | 7 | |a Reverse engineering |2 fast | |
758 | |i has work: |a Ghidra Software Reverse Engineering for Beginners (Text) |1 https://id.oclc.org/worldcat/entity/E39PCXTv8vBgPRpRpJjGYpD3pK |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a David, A P. |t Ghidra Software Reverse Engineering for Beginners. |d Birmingham : Packt Publishing, Limited, ©2021 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2708468 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH38120363 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL6449017 | ||
938 | |a EBSCOhost |b EBSC |n 2708468 | ||
938 | |a YBP Library Services |b YANK |n 301807003 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1229917938 |
---|---|
_version_ | 1816882536243003393 |
adam_text | |
any_adam_object | |
author | David, A. P. |
author_facet | David, A. P. |
author_role | aut |
author_sort | David, A. P. |
author_variant | a p d ap apd |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.76.O62 D38 2020 |
callnumber-search | QA76.76.O62 D38 2020 |
callnumber-sort | QA 276.76 O62 D38 42020 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cover -- Title Page -- Copyright and Credits -- Dedicated -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Introduction to Ghidra -- Chapter 1: Getting Started with Ghidra -- Technical requirements -- WikiLeaks Vault 7 -- NSA release -- Ghidra versus IDA and many other competitors -- Ghidra overview -- Installing Ghidra -- Overview of Ghidra's features -- Summary -- Questions -- Chapter 2: Automating RE Tasks with Ghidra Scripts -- Technical requirements -- Using and adapting existing scripts -- The script class -- Script development -- Summary -- Questions Chapter 3: Ghidra Debug Mode -- Technical requirements -- Setting up the Ghidra development environment -- Overviewing the software requirements -- Installing the Java JDK -- Installing the Eclipse IDE -- Installing PyDev -- Installing GhidraDev -- Debugging the Ghidra code and Ghidra scripts -- Debugging Ghidra scripts from Eclipse -- Debugging any Ghidra component from Eclipse -- Ghidra RCE vulnerability -- Explaining the Ghidra RCE vulnerability -- Exploiting the Ghidra RCE vulnerability -- Fixing the Ghidra RCE vulnerability -- Looking for vulnerable computers -- Summary -- Questions Further reading -- Chapter 4: Using Ghidra Extensions -- Technical requirements -- Installing existing Ghidra extensions -- Analyzing the code of the Sample Table Provider plugin -- Understanding the Ghidra extension skeleton -- Analyzers -- Filesystems -- Plugins -- Exporters -- Loaders -- Developing a Ghidra extension -- Summary -- Questions -- Further reading -- Section 2: Reverse Engineering -- Chapter 5: Reversing Malware Using Ghidra -- Technical requirements -- Setting up the environment -- Looking for malware indicators -- Looking for strings Intelligence information and external sources -- Checking import functions -- Dissecting interesting malware sample parts -- The entry point function -- Analyzing the 0x00453340 function -- Analyzing the 0x00453C10 function -- Analyzing the 0x0046EA60 function -- Analyzing the 0x0046BEB0 function -- Analyzing the 0x0046E3A0 function -- Analyzing the 0x004559B0 function -- Analyzing the 0x004554E0 function -- Analyzing the 0x0046C860 function -- Analyzing the 0x0046A100 function -- Summary -- Questions -- Further reading -- Chapter 6: Scripting Malware Analysis -- Technical requirements Using the Ghidra scripting API -- Writing scripts using the Java programming language -- Writing scripts using the Python programming language -- Deobfuscating malware samples using scripts -- The delta offset -- Translating API hashes to addresses -- Deobfuscating the hash table using Ghidra scripting -- Improving the scripting results -- Summary -- Questions -- Further reading -- Chapter 7: Using Ghidra Headless Analyzer -- Technical requirements -- Why use headless mode? -- Creating and populating projects -- Performing analysis on imported or existing binaries Running non-GUI scripts in a project. |
ctrlnum | (OCoLC)1229917938 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05656cam a2200649 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1229917938</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">210109t20202020enk o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">UKAHL</subfield><subfield code="d">NLW</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCO</subfield><subfield code="d">YDX</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DST</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">TMA</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1255678721</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781800201842</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1800201842</subfield><subfield code="q">(electronic book)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1800207972</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781800207974</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1229917938</subfield><subfield code="z">(OCoLC)1255678721</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.76.O62</subfield><subfield code="b">D38 2020</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">David, A. P.,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ghidra software reverse engineering for beginners :</subfield><subfield code="b">analyze, identify, and avoid malicious code and potential threats in your networks and systems /</subfield><subfield code="c">A.P. David.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing, Ltd.,</subfield><subfield code="c">2020.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Cover -- Title Page -- Copyright and Credits -- Dedicated -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Introduction to Ghidra -- Chapter 1: Getting Started with Ghidra -- Technical requirements -- WikiLeaks Vault 7 -- NSA release -- Ghidra versus IDA and many other competitors -- Ghidra overview -- Installing Ghidra -- Overview of Ghidra's features -- Summary -- Questions -- Chapter 2: Automating RE Tasks with Ghidra Scripts -- Technical requirements -- Using and adapting existing scripts -- The script class -- Script development -- Summary -- Questions</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 3: Ghidra Debug Mode -- Technical requirements -- Setting up the Ghidra development environment -- Overviewing the software requirements -- Installing the Java JDK -- Installing the Eclipse IDE -- Installing PyDev -- Installing GhidraDev -- Debugging the Ghidra code and Ghidra scripts -- Debugging Ghidra scripts from Eclipse -- Debugging any Ghidra component from Eclipse -- Ghidra RCE vulnerability -- Explaining the Ghidra RCE vulnerability -- Exploiting the Ghidra RCE vulnerability -- Fixing the Ghidra RCE vulnerability -- Looking for vulnerable computers -- Summary -- Questions</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Further reading -- Chapter 4: Using Ghidra Extensions -- Technical requirements -- Installing existing Ghidra extensions -- Analyzing the code of the Sample Table Provider plugin -- Understanding the Ghidra extension skeleton -- Analyzers -- Filesystems -- Plugins -- Exporters -- Loaders -- Developing a Ghidra extension -- Summary -- Questions -- Further reading -- Section 2: Reverse Engineering -- Chapter 5: Reversing Malware Using Ghidra -- Technical requirements -- Setting up the environment -- Looking for malware indicators -- Looking for strings</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Intelligence information and external sources -- Checking import functions -- Dissecting interesting malware sample parts -- The entry point function -- Analyzing the 0x00453340 function -- Analyzing the 0x00453C10 function -- Analyzing the 0x0046EA60 function -- Analyzing the 0x0046BEB0 function -- Analyzing the 0x0046E3A0 function -- Analyzing the 0x004559B0 function -- Analyzing the 0x004554E0 function -- Analyzing the 0x0046C860 function -- Analyzing the 0x0046A100 function -- Summary -- Questions -- Further reading -- Chapter 6: Scripting Malware Analysis -- Technical requirements</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Using the Ghidra scripting API -- Writing scripts using the Java programming language -- Writing scripts using the Python programming language -- Deobfuscating malware samples using scripts -- The delta offset -- Translating API hashes to addresses -- Deobfuscating the hash table using Ghidra scripting -- Improving the scripting results -- Summary -- Questions -- Further reading -- Chapter 7: Using Ghidra Headless Analyzer -- Technical requirements -- Why use headless mode? -- Creating and populating projects -- Performing analysis on imported or existing binaries</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Running non-GUI scripts in a project.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from digital title page (viewed on June 13, 2021).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Open source software.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh99003437</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Reverse engineering.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh93004214</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90001862</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Logiciels libres.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Rétro-ingénierie.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Bioinformatics.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Buyer's Guides.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Open source software</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Reverse engineering</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Ghidra Software Reverse Engineering for Beginners (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCXTv8vBgPRpRpJjGYpD3pK</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">David, A P.</subfield><subfield code="t">Ghidra Software Reverse Engineering for Beginners.</subfield><subfield code="d">Birmingham : Packt Publishing, Limited, ©2021</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2708468</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH38120363</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL6449017</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2708468</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">301807003</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1229917938 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:30:10Z |
institution | BVB |
isbn | 9781800201842 1800201842 |
language | English |
oclc_num | 1229917938 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Packt Publishing, Ltd., |
record_format | marc |
spelling | David, A. P., author. Ghidra software reverse engineering for beginners : analyze, identify, and avoid malicious code and potential threats in your networks and systems / A.P. David. Birmingham : Packt Publishing, Ltd., 2020. ©2020 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier Cover -- Title Page -- Copyright and Credits -- Dedicated -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Introduction to Ghidra -- Chapter 1: Getting Started with Ghidra -- Technical requirements -- WikiLeaks Vault 7 -- NSA release -- Ghidra versus IDA and many other competitors -- Ghidra overview -- Installing Ghidra -- Overview of Ghidra's features -- Summary -- Questions -- Chapter 2: Automating RE Tasks with Ghidra Scripts -- Technical requirements -- Using and adapting existing scripts -- The script class -- Script development -- Summary -- Questions Chapter 3: Ghidra Debug Mode -- Technical requirements -- Setting up the Ghidra development environment -- Overviewing the software requirements -- Installing the Java JDK -- Installing the Eclipse IDE -- Installing PyDev -- Installing GhidraDev -- Debugging the Ghidra code and Ghidra scripts -- Debugging Ghidra scripts from Eclipse -- Debugging any Ghidra component from Eclipse -- Ghidra RCE vulnerability -- Explaining the Ghidra RCE vulnerability -- Exploiting the Ghidra RCE vulnerability -- Fixing the Ghidra RCE vulnerability -- Looking for vulnerable computers -- Summary -- Questions Further reading -- Chapter 4: Using Ghidra Extensions -- Technical requirements -- Installing existing Ghidra extensions -- Analyzing the code of the Sample Table Provider plugin -- Understanding the Ghidra extension skeleton -- Analyzers -- Filesystems -- Plugins -- Exporters -- Loaders -- Developing a Ghidra extension -- Summary -- Questions -- Further reading -- Section 2: Reverse Engineering -- Chapter 5: Reversing Malware Using Ghidra -- Technical requirements -- Setting up the environment -- Looking for malware indicators -- Looking for strings Intelligence information and external sources -- Checking import functions -- Dissecting interesting malware sample parts -- The entry point function -- Analyzing the 0x00453340 function -- Analyzing the 0x00453C10 function -- Analyzing the 0x0046EA60 function -- Analyzing the 0x0046BEB0 function -- Analyzing the 0x0046E3A0 function -- Analyzing the 0x004559B0 function -- Analyzing the 0x004554E0 function -- Analyzing the 0x0046C860 function -- Analyzing the 0x0046A100 function -- Summary -- Questions -- Further reading -- Chapter 6: Scripting Malware Analysis -- Technical requirements Using the Ghidra scripting API -- Writing scripts using the Java programming language -- Writing scripts using the Python programming language -- Deobfuscating malware samples using scripts -- The delta offset -- Translating API hashes to addresses -- Deobfuscating the hash table using Ghidra scripting -- Improving the scripting results -- Summary -- Questions -- Further reading -- Chapter 7: Using Ghidra Headless Analyzer -- Technical requirements -- Why use headless mode? -- Creating and populating projects -- Performing analysis on imported or existing binaries Running non-GUI scripts in a project. Online resource; title from digital title page (viewed on June 13, 2021). Open source software. http://id.loc.gov/authorities/subjects/sh99003437 Reverse engineering. http://id.loc.gov/authorities/subjects/sh93004214 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computer Security https://id.nlm.nih.gov/mesh/D016494 Logiciels libres. Rétro-ingénierie. Sécurité informatique. COMPUTERS General. bisacsh COMPUTERS Bioinformatics. bisacsh COMPUTERS Buyer's Guides. bisacsh Computer security fast Open source software fast Reverse engineering fast has work: Ghidra Software Reverse Engineering for Beginners (Text) https://id.oclc.org/worldcat/entity/E39PCXTv8vBgPRpRpJjGYpD3pK https://id.oclc.org/worldcat/ontology/hasWork Print version: David, A P. Ghidra Software Reverse Engineering for Beginners. Birmingham : Packt Publishing, Limited, ©2021 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2708468 Volltext |
spellingShingle | David, A. P. Ghidra software reverse engineering for beginners : analyze, identify, and avoid malicious code and potential threats in your networks and systems / Cover -- Title Page -- Copyright and Credits -- Dedicated -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Introduction to Ghidra -- Chapter 1: Getting Started with Ghidra -- Technical requirements -- WikiLeaks Vault 7 -- NSA release -- Ghidra versus IDA and many other competitors -- Ghidra overview -- Installing Ghidra -- Overview of Ghidra's features -- Summary -- Questions -- Chapter 2: Automating RE Tasks with Ghidra Scripts -- Technical requirements -- Using and adapting existing scripts -- The script class -- Script development -- Summary -- Questions Chapter 3: Ghidra Debug Mode -- Technical requirements -- Setting up the Ghidra development environment -- Overviewing the software requirements -- Installing the Java JDK -- Installing the Eclipse IDE -- Installing PyDev -- Installing GhidraDev -- Debugging the Ghidra code and Ghidra scripts -- Debugging Ghidra scripts from Eclipse -- Debugging any Ghidra component from Eclipse -- Ghidra RCE vulnerability -- Explaining the Ghidra RCE vulnerability -- Exploiting the Ghidra RCE vulnerability -- Fixing the Ghidra RCE vulnerability -- Looking for vulnerable computers -- Summary -- Questions Further reading -- Chapter 4: Using Ghidra Extensions -- Technical requirements -- Installing existing Ghidra extensions -- Analyzing the code of the Sample Table Provider plugin -- Understanding the Ghidra extension skeleton -- Analyzers -- Filesystems -- Plugins -- Exporters -- Loaders -- Developing a Ghidra extension -- Summary -- Questions -- Further reading -- Section 2: Reverse Engineering -- Chapter 5: Reversing Malware Using Ghidra -- Technical requirements -- Setting up the environment -- Looking for malware indicators -- Looking for strings Intelligence information and external sources -- Checking import functions -- Dissecting interesting malware sample parts -- The entry point function -- Analyzing the 0x00453340 function -- Analyzing the 0x00453C10 function -- Analyzing the 0x0046EA60 function -- Analyzing the 0x0046BEB0 function -- Analyzing the 0x0046E3A0 function -- Analyzing the 0x004559B0 function -- Analyzing the 0x004554E0 function -- Analyzing the 0x0046C860 function -- Analyzing the 0x0046A100 function -- Summary -- Questions -- Further reading -- Chapter 6: Scripting Malware Analysis -- Technical requirements Using the Ghidra scripting API -- Writing scripts using the Java programming language -- Writing scripts using the Python programming language -- Deobfuscating malware samples using scripts -- The delta offset -- Translating API hashes to addresses -- Deobfuscating the hash table using Ghidra scripting -- Improving the scripting results -- Summary -- Questions -- Further reading -- Chapter 7: Using Ghidra Headless Analyzer -- Technical requirements -- Why use headless mode? -- Creating and populating projects -- Performing analysis on imported or existing binaries Running non-GUI scripts in a project. Open source software. http://id.loc.gov/authorities/subjects/sh99003437 Reverse engineering. http://id.loc.gov/authorities/subjects/sh93004214 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computer Security https://id.nlm.nih.gov/mesh/D016494 Logiciels libres. Rétro-ingénierie. Sécurité informatique. COMPUTERS General. bisacsh COMPUTERS Bioinformatics. bisacsh COMPUTERS Buyer's Guides. bisacsh Computer security fast Open source software fast Reverse engineering fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh99003437 http://id.loc.gov/authorities/subjects/sh93004214 http://id.loc.gov/authorities/subjects/sh90001862 https://id.nlm.nih.gov/mesh/D016494 |
title | Ghidra software reverse engineering for beginners : analyze, identify, and avoid malicious code and potential threats in your networks and systems / |
title_auth | Ghidra software reverse engineering for beginners : analyze, identify, and avoid malicious code and potential threats in your networks and systems / |
title_exact_search | Ghidra software reverse engineering for beginners : analyze, identify, and avoid malicious code and potential threats in your networks and systems / |
title_full | Ghidra software reverse engineering for beginners : analyze, identify, and avoid malicious code and potential threats in your networks and systems / A.P. David. |
title_fullStr | Ghidra software reverse engineering for beginners : analyze, identify, and avoid malicious code and potential threats in your networks and systems / A.P. David. |
title_full_unstemmed | Ghidra software reverse engineering for beginners : analyze, identify, and avoid malicious code and potential threats in your networks and systems / A.P. David. |
title_short | Ghidra software reverse engineering for beginners : |
title_sort | ghidra software reverse engineering for beginners analyze identify and avoid malicious code and potential threats in your networks and systems |
title_sub | analyze, identify, and avoid malicious code and potential threats in your networks and systems / |
topic | Open source software. http://id.loc.gov/authorities/subjects/sh99003437 Reverse engineering. http://id.loc.gov/authorities/subjects/sh93004214 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computer Security https://id.nlm.nih.gov/mesh/D016494 Logiciels libres. Rétro-ingénierie. Sécurité informatique. COMPUTERS General. bisacsh COMPUTERS Bioinformatics. bisacsh COMPUTERS Buyer's Guides. bisacsh Computer security fast Open source software fast Reverse engineering fast |
topic_facet | Open source software. Reverse engineering. Computer security. Computer Security Logiciels libres. Rétro-ingénierie. Sécurité informatique. COMPUTERS General. COMPUTERS Bioinformatics. COMPUTERS Buyer's Guides. Computer security Open source software Reverse engineering |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2708468 |
work_keys_str_mv | AT davidap ghidrasoftwarereverseengineeringforbeginnersanalyzeidentifyandavoidmaliciouscodeandpotentialthreatsinyournetworksandsystems |