Jump to content

Eldad Eilam - Reversing: Secrets of Reverse Engineering


tetox

Recommended Posts

Hidden Content

    Give reaction to this post to see the hidden content.

Book: Reversing: Secrets of Reverse Engineering
Author(s): Eldad Eilam
Publisher: Wiley
Tags: Reversing Tools, Antireversing Techniques, Decompilation.
Year: 1st Edition (April 15, 2005)
Print Length: 624 pages
Format: PDF (True), EPUB
Language: English
ISBN-10: 0764574817
ISBN-13: 9780764574818
Size: 12.9 MB (RAR)

About this book:
Sometimes, the best way to advance is in reverse

If you want to know how something works, you take it apart very carefully. That's exactly what this book shows you—how to deconstruct software in a way that reveals design and implementation details, sometimes even source code. Why? Because reversing reveals weak spots, so you can target your security efforts. Because you can reverse- engineer malicious code in order to neutralize it. Because understanding what makes a program work lets you build a better one. You'll learn how here.

  • Learn to read compiler-generated assembly language code for IA-32 compatible processors
  • Decipher an undocumented file format or network protocol
  • Understand when reverse engineering is legal, and when —and why—it may not be
  • See how hackers use reversing to defeat copy protection technology
  • Find out how to pull the plug on malicious code
  • Determine how to prevent others from reversing your code, and find out how effective such steps can be
  • Explore reverse engineering on the .NET platform and its assembly language, MSIL
  • Observe the dissection of a real-world malicious program and see how the attacker used it to control infected systems

Table Of Contents:
Introduction
Part I: Reversing 101
    Chapter 1: Foundations
    Chapter 2: Low-Level Software
    Chapter 3: Windows Fundamentals
    Chapter 4: Reversing Tools
Part II: Applied Reversing
    Chapter 5: Beyond the Documentation
    Chapter 6: Deciphering File Formats
    Chapter 7: Auditing Program Binaries
    Chapter 8: Reversing Malware
Part III: Cracking
    Chapter 9: Piracy and Copy Protection
    Chapter 10: Antireversing Techniques
    Chapter 11: Breaking Protections
Part IV: Beyond Disassembly
    Chapter 12: Reversing .NET
    Chapter 13: Decompilation

Appendix A: Deciphering Code Structures
    Understanding Low-Level Logic
    Control Flow & Program Layout
    Branchless Logic
    Effects of Working-Set Tuning on Reversing
Appendix B: Understanding Compiled Arithmetic
    Arithmetic Flags
    Basic Integer Arithmetic
    64-Bit Arithmetic
    Type Conversions
Appendix ? Deciphering Program Data
    The Stack
    Basic Data Constructs
    Data Structures
    Classes
Appendix ? Citations

Hidden Content

    Give reaction to this post to see the hidden content.

Credits to the one who initially shared the file.

  • Thanks 1
Link to comment

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
×
×
  • Create New...