Einband:
Kartonierter Einband
Untertitel:
The Hacker's Guide to Reverse Engineering
Herausgeber:
John Wiley & Sons Inc
Erscheinungsdatum:
15.04.2005
Beginning with a basic primer on reverse engineering includingcomputer internals, operating systems, and assemblylanguage and then discussing the various
applications of reverse engineering, this book provides readerswith practical, in-depth techniques for software reverseengineering.
Informationen zum Autor Eldad Eilam is a consultant in the field of reverse engineering. He assists clients with operating system and in-depth software reverse engineering, and has devoted several years to developing advanced reverse engineering techniques. Klappentext Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the variousapplications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language Zusammenfassung Beginning with a basic primer on reverse engineering including computer internals, operating systems, and assembly language and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. Inhaltsverzeichnis Foreword.Acknowledgments.Introduction.Part I: Reversing 101.Chapter 1: Foundations.Chapter 2: Low-Level Software.Chapter 3: Windows Fundamentals.Chapter 4: Reversing Tools.Part II: Applied Reversing.Chapter 5: Beyond the Documentation.Chapter 6: Deciphering File Formats.Chapter 7: Auditing Program Binaries.Chapter 8: Reversing Malware.Part III: Cracking.Chapter 9: Piracy and Copy Protection.Chapter 10: Antireversing Techniques.Chapter 11: Breaking Protections.Part IV: Beyond Disassembly.Chapter 12: Reversing .NET.Chapter 13: Decompilation.Appendix A: Deciphering Code Structures.Appendix B: Understanding Compiled Arithmetic.Appendix C: Deciphering Program Data.Index....
Autorentext
Eldad Eilam is a consultant in the field of reverse engineering. He assists clients with operating system and in-depth software reverse engineering, and has devoted several years to developing advanced reverse engineering techniques.
Klappentext
Sometimes, the best way to advance is in reverse If you want to know how something works, you take it apart very carefully. That's exactly what this book shows you?how to deconstruct software in a way that reveals design and implementation details, sometimes even source code. Why? Because reversing reveals weak spots, so you can target your security efforts. Because you can reverse- engineer malicious code in order to neutralize it. Because understanding what makes a program work lets you build a better one. You'll learn how here. Learn to read compiler-generated assembly language code for IA-32 compatible processors Decipher an undocumented file format or network protocol Understand when reverse engineering is legal, and when ?and why?it may not be See how hackers use reversing to defeat copy protection technology Find out how to pull the plug on malicious code Determine how to prevent others from reversing your code, and find out how effective such steps can be Explore reverse engineering on the .NET platform and its assembly language, MSIL Observe the dissection of a real-world malicious program and see how the attacker used it to control infected systems Companion Web site Visit www.wiley.com/go/eeilam for a complete list of the sample programs in the book and links to valuable papers and products.
Zusammenfassung
Beginning with a basic primer on reverse engineering including computer internals, operating systems, and assembly language and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering.
Inhalt
Foreword vii Acknowledgments xi Introduction xxiii Part I Reversing 101 1 Chapter 1 Foundations 3 What Is Reverse Engineering? 3 Software Reverse Engineering: Reversing 4 Reversing Applications 4 Security-Related Reversing 5 Malicious Software 5 Reversing Cryptographic Algorithms 6 Digital Rights Management 7 Auditing Program Binaries 7 Reversing in Software Development 8 Achieving Interoperability with Proprietary Software 8 Developing Competing Software 8 Evaluating Software Quality and Robustness 9 Low-Level Software 9 Assembly Language 10 Compilers 11 Virtual Machines and Bytecodes 12 Operating Systems 13 The Reversing Process 13 System-Level Reversing 14 Code-Level Reversing 14 The Tools 14 System-Monitoring Tools 15 Disassemblers 15 Debuggers 15 Decompilers 16 Is Reversing Legal? 17 Interoperability 17 Competition 18 Copyright Law 19 Trade Secrets and Patents 20 The Digital Millenium Copyright Act 20 DMCA Cases 22 License Agreement Considerations 23 Code Samples & Tools 23 Conclusion 23 Chapter 2 Low-Level Software 25 High-Level Perspectives 26 Program Structure 26 Modules 28 Common Code Constructs 28 Data Management 29 Variables 30 User-Defined Data Structures 30 Lists 31 Control Flow 32 High-Level Languages 33 C 34 C++ 35 Java 36 C# 36 Low-Level Perspectives 37 Low-Level Data Management 37 Registers 39 The Stack 40 Heaps 42 Executable Data Sections 43 Control Flow 43 Assembly Language 101 44 Registers 44 Flags 46 Instruction Format 47 Basic Instructions 48 Moving Data 49 Arithmetic 49 Comparing Operands 50 Conditional Branches 51 Function Calls 51 Examples 52 A Primer on Compilers and Compilation 53 Defining a Compiler 54 Compiler Architecture 55 Front End 55 Intermediate Representations 55 Optimizer 56 Back End 57 Listing Files 58 Specific Compilers 59 Execution Environments 60 Software Execution Environments (Virtual Machines) 60 Bytecodes 61 Interpreters 61 Just-in-Time Compilers 62 Reversing Strategies 62 Hardware Execution Environments in Modern Processors 63 Intel NetBurst 65 µops (Micro-Ops) 65 Pipelines 65 Branch Prediction 67 Conclusion 68 Chapter 3 Windows Fundamentals 69 Components and Basic Architecture 70 Brief History 70 Features 70 Supported Hardware 71 Memory Management 71 Virtual Memory and Paging 72 Paging 73 Page Faults 73 Working Sets 74 Ker…
Leider konnten wir für diesen Artikel keine Preise ermitteln ...
billigbuch.ch sucht jetzt für Sie die besten Angebote ...
Die aktuellen Verkaufspreise von
6 Onlineshops werden
in Realtime abgefragt.
Sie können das gewünschte Produkt anschliessend direkt beim Anbieter Ihrer Wahl bestellen.
# |
Onlineshop |
Preis CHF |
Versand CHF |
Total CHF |
|
|
1 |
Seller |
0.00 |
0.00
|
0.00 |
|
|
Onlineshops ohne Resultate: