Artículos relacionados a Implementing Reverse Engineering: The Real Practice...

Implementing Reverse Engineering: The Real Practice of X86 Internals, Code Calling Conventions, Ransomware Decryption, Application Cracking, Assembly ... Open Source Tools (English Edition) - Tapa blanda

 
9789391030377: Implementing Reverse Engineering: The Real Practice of X86 Internals, Code Calling Conventions, Ransomware Decryption, Application Cracking, Assembly ... Open Source Tools (English Edition)

Sinopsis

More practical less theory

Key Features

● In-depth practical demonstration with multiple examples of reverse engineering concepts.

● Provides a step-by-step approach to reverse engineering, including assembly instructions.

● Reverse engineering strategies for simple-to-complex applications like Wannacry ransomware and Windows calculator.

Description

The book ‘Implementing Reverse Engineering’ begins with a step-by-step explanation of the fundamentals of reverse engineering. You will learn how to use reverse engineering to find bugs and hacks in real-world applications. This book is divided into three sections. The first section is an exploration of the reverse engineering process. The second section explains reverse engineering of applications, and the third section is a collection of real-world use-cases with solutions.

The first section introduces the basic concepts of a computing system and the data building blocks of the computing system. This section also includes open-source tools such as CFF Explorer, Ghidra, Cutter, and x32dbg. The second section goes over various reverse engineering practicals on various applications to give users hands-on experience.



What you will learn

● Understand different code calling conventions like CDECL, STDCALL, and FASTCALL with practical illustrations.

● Analyze and break WannaCry ransomware using Ghidra.

● Hack the Windows calculator to modify its behavior.

Who this book is for

This book is for cybersecurity researchers, bug bounty hunters, software developers, software testers, and software quality assurance experts who want to perform reverse engineering for advanced security from attacks. Interested readers can also be from high schools or universities (with a Computer Science background).

Table of Contents

1. Impact of Reverse Engineering

2. Understanding Architecture of x86 machines

3. Up and Running with Reverse Engineering tools

4. Walkthrough on Assembly Instructions

5. Types of Code Calling Conventions

6. Reverse Engineering Pattern of Basic Code

7. Reverse Engineering Pattern of the printf() Program

8. Reverse Engineering Pattern of the Pointer Program

9. Reverse Engineering Pattern of the Decision Control Structure

10. Reverse Engineering Pattern of the Loop Control Structure

11. Array Code Pattern in Reverse Engineering

12. Structure Code Pattern in Reverse Engineering

13. Scanf Program Pattern in Reverse Engineering

14. Strcpy Program Pattern in Reverse Engineering

15. Simple Interest Code Pattern in Reverse Engineering

16. Breaking Wannacry Ransomware with Reverse Engineering

17. Generate Pseudo Code from the Binary File

18. Fun with Windows Calculator Using Reverse Engineering

About the Authors

Jitender Narula is an experienced Cyber Security Specialist currently associated with the International Institute of Cyber Security (www.iicybersecurity.com) having 18+ years of industry experience. He has many years of cybersecurity experience with the government and the corporate world. In India, he has worked for law enforcement agencies (LEA), government entities like Delhi Police, ICAI (Institute of Chartered Accountants of India), Delhi University, and private organizations.

LinkedIn Profile: https://in.linkedin.com/in/jitender-narula-7146123

Blog Link:https://www.securitynewspaper.com/2020/04/24/employee-data-leaked-apple-google-microsoftlinkedin-intel-cisco-verizon-oracle-hp-nvidia-affected/

"Sinopsis" puede pertenecer a otra edición de este libro.

Acerca del autor

Jitender Narula is an experienced Cyber Security Specialist currently associated with the International Institute of Cyber Security having 18+ years of industry experience. He has many years of cybersecurity experience with the government and the corporate world. In India, he has worked for law enforcement agencies (LEA), government entities like Delhi Police, ICAI (Institute of Chartered Accountants of India), Delhi University, and private organizations. He has worked on the projects of AT&T, Citrix, Google, Conexant, IPolicy Networks (Tech Mahindra now), Narus (a wholly-owned subsidiary of The Boeing Company), and HFCL. Apart from this, he has conducted training programs for various corporations and government officials in India, Mexico.

"Sobre este título" puede pertenecer a otra edición de este libro.

Comprar usado

Condición: Bueno
Ship within 24hrs. Satisfaction...
Ver este artículo

EUR 63,56 gastos de envío desde Estados Unidos de America a España

Destinos, gastos y plazos de envío

Comprar nuevo

Ver este artículo

EUR 28,40 gastos de envío desde India a España

Destinos, gastos y plazos de envío

Resultados de la búsqueda para Implementing Reverse Engineering: The Real Practice...

Imagen de archivo

Jitender Narula
Publicado por BPB Publications, 2021
ISBN 10: 9391030378 ISBN 13: 9789391030377
Nuevo Soft cover

Librería: Vedams eBooks (P) Ltd, New Delhi, India

Calificación del vendedor: 4 de 5 estrellas Valoración 4 estrellas, Más información sobre las valoraciones de los vendedores

Soft cover. Condición: New. The book 'Implementing Reverse Engineering' begins with a step-by-step explanation of the fundamentals of reverse engineering. You will learn how to use reverse engineering to find bugs and hacks in real-world applications. This book is divided into three sections. The first section is an exploration of the reverse engineering process. The second section explains reverse engineering of applications, and the third section is a collection of real-world use-cases with solutions. The first section introduces the basic concepts of a computing system and the data building blocks of the computing system. This section also includes open-source tools such as CFF Explorer, Ghidra, Cutter, and x32dbg. The second section goes over various reverse engineering practicals on various applications to give users hands-on experience. In the third section, reverse engineering of Wannacry ransomware, a well-known Windows application, and various exercises are demonstrated step by step. In a very detailed and step-by-step manner, you will practice and understand different assembly instructions, types of code calling conventions, assembly patterns of applications with the printf function, pointers, array, structure, scanf, strcpy function, decision, and loop control structures. You will learn how to use open-source tools for reverse engineering such as portable executable editors, disassemblers, and debuggers. Nº de ref. del artículo: 143107

Contactar al vendedor

Comprar nuevo

EUR 14,84
Convertir moneda
Gastos de envío: EUR 28,40
De India a España
Destinos, gastos y plazos de envío

Cantidad disponible: 5 disponibles

Añadir al carrito

Imagen de archivo

Narula, Jitender
Publicado por BPB Publications (edition ), 2021
ISBN 10: 9391030378 ISBN 13: 9789391030377
Antiguo o usado Paperback

Librería: BooksRun, Philadelphia, PA, Estados Unidos de America

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Paperback. Condición: Very Good. Ship within 24hrs. Satisfaction 100% guaranteed. APO/FPO addresses supported. Nº de ref. del artículo: 9391030378-8-1

Contactar al vendedor

Comprar usado

EUR 52,64
Convertir moneda
Gastos de envío: EUR 63,56
De Estados Unidos de America a España
Destinos, gastos y plazos de envío

Cantidad disponible: 1 disponibles

Añadir al carrito