- Mastering Reverse Engineering
- Reginald Wong
- 327字
- 2021-06-10 19:40:17
What this book covers
Chapter 1, Preparing to Reverse, shows how to obtain the samples used throughout the book and explains the journey we are about to embark on.
Chapter 2, Identification and Extraction of Hidden Components, covers basics of the operating system and malware installation behavior. We will learn where malware usually drops files and makes registry entries.
Chapter 3, The Low-Level Language, briefly covers the Assembly language and why we must understand it in order to reverse engineer.
Chapter 4, Static and Dynamic Reversing, explains how static and dynamic analysis are implemented. We will also have a brief discussion regarding reversing of a file using a few tools.
Chapter 5, Tools of the Trade, compares and contrasts tools of the trade and explains their weaknesses and when a tool won't work as intended, allowing you to change your tools and know where to turn to get the job done without blaming a tool for lacking a capability.
Chapter 6, RE in Linux Platforms, explains how to perform a static and dynamic Windows analysis in a Linux environment.
Chapter 7, RE for Windows Platforms, explains how to perform static and dynamic Windows analysis directly in a Windows environment.
Chapter 8, Sandboxing: Virtualization as a Component for RE, shows how to use emulation to inform reverse engineering and overcome obstacles when running on hardware other than the target binary supports.
Chapter 9, Binary Obfuscation Techniques, explains how to reverse engineer simple obfuscation techniques.
Chapter 10, Packing and Encryption, covers using debuggers to pause execution and dump the contents of memory for analysis using our disassembly tools.
Chapter 11, Anti-analysis tricks, shows how to identify and handle anti-reversing and anti-debugging tricks.
Chapter 12, Practical Reverse Engineering of a Windows Executable, covers practical use of the tools we are familiar with at this point.
Chapter 13, Reversing Various File Types, covers analyzing various file types using up-to-date tools.
- Learning Python for Forensics
- 工業互聯網安全
- CSO進階之路:從安全工程師到首席安全官
- 暗戰亮劍:黑客滲透與防御全程實錄
- 諸神之眼:Nmap網絡安全審計技術揭秘
- 互聯網企業安全高級指南
- 網絡安全監控實戰:深入理解事件檢測與響應
- 紅藍攻防:技術與策略(原書第3版)
- 密碼朋克:自由與互聯網的未來
- 云安全深度剖析:技術原理及應用實踐
- 極限黑客攻防:CTF賽題揭秘
- Hands-On Spring Security 5 for Reactive Applications
- INSTANT Penetration Testing:Setting Up a Test Lab How-to
- 商用密碼發展報告(2012—2017年)
- 攜手構建網絡空間命運共同體