Zum Hauptinhalt springen
Dekorationsartikel gehören nicht zum Leistungsumfang.
x86 Software Reverse-Engineering, Cracking, and Counter-Measures
Buch von Christopher Domas (u. a.)
Sprache: Englisch

61,00 €*

inkl. MwSt.

Versandkostenfrei per Post / DHL

Aktuell nicht verfügbar

Kategorien:
Beschreibung

An accessible roadmap to software disassembly for advanced security professionals

In x86 Software Reverse-Engineering, Cracking, and Counter-Measures, veteran security researchers and thought leaders deliver an introductory crash course in software reverse-engineering and cracking, as well as the methods used to counter those tactics.

The authors provide the foundation to take anyone with a basic background in software and turn them in to proficient x86 reverse engineers, crackers and defenders.

In the book, you'll examine software, techniques, and tools that real-world crackers, researchers, and defenders use. You'll put your newfound knowledge to the test with the use of extensive hands on labs, introducing you to a wide range of industry favorite tools - such as IDA, Resource Hacker, Cheat Engine, Immunity, and more. Additionally you'll learn some powerful defensive techniques that not only makes you a better defender but empowers you to be a better reverse engineering and cracker.

An essential and practice resource for developers, security professionals, security researchers, and programmers. x86 Software Reverse-Engineering, Cracking and Counter-Measures is the hands-on blueprint for taking apart, reasoning about, and manipulating x86 based code that the security community has been waiting for.

An accessible roadmap to software disassembly for advanced security professionals

In x86 Software Reverse-Engineering, Cracking, and Counter-Measures, veteran security researchers and thought leaders deliver an introductory crash course in software reverse-engineering and cracking, as well as the methods used to counter those tactics.

The authors provide the foundation to take anyone with a basic background in software and turn them in to proficient x86 reverse engineers, crackers and defenders.

In the book, you'll examine software, techniques, and tools that real-world crackers, researchers, and defenders use. You'll put your newfound knowledge to the test with the use of extensive hands on labs, introducing you to a wide range of industry favorite tools - such as IDA, Resource Hacker, Cheat Engine, Immunity, and more. Additionally you'll learn some powerful defensive techniques that not only makes you a better defender but empowers you to be a better reverse engineering and cracker.

An essential and practice resource for developers, security professionals, security researchers, and programmers. x86 Software Reverse-Engineering, Cracking and Counter-Measures is the hands-on blueprint for taking apart, reasoning about, and manipulating x86 based code that the security community has been waiting for.

Über den Autor

STEPHANIE DOMAS is the CISO of Canonical, where she is driving Canonical to be the most trusted computational partner in all of open source. Prior to that she was the Chief Security Technology Strategist at Intel where she owned the cross-Intel security technology strategy across Intel's wide portfolio of products. Stephanie is a passionate educator, strategist, speaker, advisor, and security enthusiast.

CHRISTOPHER DOMAS is a security researcher primarily focused on firmware, hardware, and low level processor exploitation. He is best known for releasing impractical solutions to non-existent problems, including the world's first single instruction C compiler (M/o/Vfuscator), toolchains for generating images in program control flow graphs (REpsych), and Turing-machines in the vi text editor.

Inhaltsverzeichnis

Introduction xxiii

Chapter 1 Decompilation and Architecture 1

Chapter 2 x86 Assembly: Data, Modes, Registers, and Memory Access 13

Chapter 3 x86 Assembly: Instructions 31

Chapter 4 Building and Running Assembly Programs 43

Chapter 5 Understanding Condition Codes 57

Chapter 6 Analyzing and Debugging Assembly Code 65

Chapter 7 Functions and Control Flow 77

Chapter 8 Compilers and Optimizers 127

Chapter 9 Reverse Engineering: Tools and Strategies 137

Chapter 10 Cracking: Tools and Strategies 147

Chapter 11 Patching and Advanced Tooling 179

Chapter 12 Defense 203

Chapter 13 Advanced Defensive Techniques 217

Chapter 14 Detection and Prevention 229

Chapter 15 Legal 239

Chapter 16 Advanced Techniques 245

Chapter 17 Bonus Topics 251

Conclusion 271

Index 273

Details
Erscheinungsjahr: 2024
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Buch
ISBN-13: 9781394199884
ISBN-10: 1394199880
Sprache: Englisch
Einband: Gebunden
Autor: Domas, Christopher
Domas, Stephanie
Hersteller: John Wiley & Sons Inc
Maße: 238 x 192 x 24 mm
Von/Mit: Christopher Domas (u. a.)
Erscheinungsdatum: 30.01.2024
Gewicht: 0,748 kg
Artikel-ID: 126948753
Über den Autor

STEPHANIE DOMAS is the CISO of Canonical, where she is driving Canonical to be the most trusted computational partner in all of open source. Prior to that she was the Chief Security Technology Strategist at Intel where she owned the cross-Intel security technology strategy across Intel's wide portfolio of products. Stephanie is a passionate educator, strategist, speaker, advisor, and security enthusiast.

CHRISTOPHER DOMAS is a security researcher primarily focused on firmware, hardware, and low level processor exploitation. He is best known for releasing impractical solutions to non-existent problems, including the world's first single instruction C compiler (M/o/Vfuscator), toolchains for generating images in program control flow graphs (REpsych), and Turing-machines in the vi text editor.

Inhaltsverzeichnis

Introduction xxiii

Chapter 1 Decompilation and Architecture 1

Chapter 2 x86 Assembly: Data, Modes, Registers, and Memory Access 13

Chapter 3 x86 Assembly: Instructions 31

Chapter 4 Building and Running Assembly Programs 43

Chapter 5 Understanding Condition Codes 57

Chapter 6 Analyzing and Debugging Assembly Code 65

Chapter 7 Functions and Control Flow 77

Chapter 8 Compilers and Optimizers 127

Chapter 9 Reverse Engineering: Tools and Strategies 137

Chapter 10 Cracking: Tools and Strategies 147

Chapter 11 Patching and Advanced Tooling 179

Chapter 12 Defense 203

Chapter 13 Advanced Defensive Techniques 217

Chapter 14 Detection and Prevention 229

Chapter 15 Legal 239

Chapter 16 Advanced Techniques 245

Chapter 17 Bonus Topics 251

Conclusion 271

Index 273

Details
Erscheinungsjahr: 2024
Genre: Informatik
Rubrik: Naturwissenschaften & Technik
Medium: Buch
ISBN-13: 9781394199884
ISBN-10: 1394199880
Sprache: Englisch
Einband: Gebunden
Autor: Domas, Christopher
Domas, Stephanie
Hersteller: John Wiley & Sons Inc
Maße: 238 x 192 x 24 mm
Von/Mit: Christopher Domas (u. a.)
Erscheinungsdatum: 30.01.2024
Gewicht: 0,748 kg
Artikel-ID: 126948753
Warnhinweis

Ähnliche Produkte

Ähnliche Produkte