• Complain

Wong - Mastering reverse engineering: re-engineer your ethical hacking skills

Here you can read online Wong - Mastering reverse engineering: re-engineer your ethical hacking skills full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Birmingham;UK, year: 2018, publisher: Packt Publishing, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Mastering reverse engineering: re-engineer your ethical hacking skills
  • Author:
  • Publisher:
    Packt Publishing
  • Genre:
  • Year:
    2018
  • City:
    Birmingham;UK
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Mastering reverse engineering: re-engineer your ethical hacking skills: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Mastering reverse engineering: re-engineer your ethical hacking skills" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features
  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching techniques with tools such as IDA Pro, x86dbg, and Radare2.
  • Explore modern security techniques to identify, exploit, and avoid cyber threats
Book Description

If you want to analyze software in order to exploit its weaknesses and strengthen its defenses, then you should explore reverse engineering. Reverse Engineering is a hackerfriendly tool used to expose security flaws and questionable privacy practices.In this book, you will learn how to analyse software even without having access to its source code or design documents. You will start off by learning the low-level language used to communicate with the computer and then move on to covering reverse engineering techniques. Next, you will explore analysis techniques using real-world tools such as IDA Pro and x86dbg. As you progress through the chapters, you will walk through use cases encountered in reverse engineering, such as encryption and compression, used to obfuscate code, and how to to identify and overcome anti-debugging and anti-analysis tricks. Lastly, you will learn how to analyse other types of files that contain code.

By the end of this book, you will have the confidence to perform reverse engineering.

What you will learn
  • Learn core reverse engineering
  • Identify and extract malware components
  • Explore the tools used for reverse engineering
  • Run programs under non-native operating systems
  • Understand binary obfuscation techniques
  • Identify and analyze anti-debugging and anti-analysis tricks
Who this book is for

If you are a security engineer or analyst or a system programmer and want to use reverse engineering to improve your software and hardware, this is the book for you. You will also find this book useful if you are a developer who wants to explore and learn reverse engineering. Having some programming/shell scripting knowledge is an added advantage.

Downloading the example code for this book You can download the example code files for all Packt books you have purchased from your account at http://www.PacktPub.com. If you purchased this book elsewhere, you can visit http://www.PacktPub.com/support and register to have the files e-mailed directly to you.

Mastering reverse engineering: re-engineer your ethical hacking skills — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Mastering reverse engineering: re-engineer your ethical hacking skills" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Mastering Reverse Engineering Re-engineer your ethical hacking skills - photo 1
Mastering Reverse Engineering
Re-engineer your ethical hacking skills
Reginald Wong

BIRMINGHAM - MUMBAI Mastering Reverse Engineering Copyright 2018 Packt - photo 2

BIRMINGHAM - MUMBAI
Mastering Reverse Engineering

Copyright 2018 Packt Publishing

All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.

Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing or its dealers and distributors, will be held liable for any damages caused or alleged to have been caused directly or indirectly by this book.

Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.

Commissioning Editor: Vijin Boricha
Acquisition Editor: Heramb Bhavsar
Content Development Editor: Arjun Joshi
Technical Editor: Cymon Pereira
Copy Editor: Safis Editing
Project Coordinator: Kinjal Bari
Proofreader: Safis Editing
Indexer: Tejal Daruwale Soni
Graphics: Jisha Chirayil
Production Coordinator: Shraddha Falebhai

First published: October 2018

Production reference: 1311018

Published by Packt Publishing Ltd.
Livery Place
35 Livery Street
Birmingham
B3 2PB, UK.

ISBN 978-1-78883-884-9

www.packtpub.com

maptio Mapt is an online digital library that gives you full access to over - photo 3
mapt.io

Mapt is an online digital library that gives you full access to over 5,000 books and videos, as well as industry leading tools to help you plan your personal development and advance your career. For more information, please visit our website.

Why subscribe?
  • Spend less time learning and more time coding with practical eBooks and Videos from over 4,000 industry professionals

  • Improve your learning with Skill Plans built especially for you

  • Get a free eBook or video every month

  • Mapt is fully searchable

  • Copy and paste, print, and bookmark content

Packt.com

Did you know that Packt offers eBook versions of every book published, with PDF and ePub files available? You can upgrade to the eBook version at www.packt.com and as a print book customer, you are entitled to a discount on the eBook copy. Get in touch with us at customercare@packtpub.com for more details.

At www.packt.com , you can also read a collection of free technical articles, sign up for a range of free newsletters, and receive exclusive discounts and offers on Packt books and eBooks.

Contributors
About the author

Reginald Wong has been in the software security industry for more than 15 years. Currently, Reggie is a lead anti-malware researcher at Vipre Security, a J2 Global company, covering various security technologies focused on attacks and malware. He previously worked for Trend Micro as the lead for the Heuristics team, dealing with forward-looking malware detection. Aside from his core work, he has also conducted in-house anti-malware training for fresh graduates. He is currently affiliated with CSPCert.ph, Philippines' CERT, and is a reporter for Wildlist.org. He has also been invited to speak at local security events, including Rootcon.

About the reviewers

Berman Enconado is very passionate about everything relating to cyber security. Ever since he was a teenager, he has practiced, toyed with, and delved in the art of cracking and hacking. He started his professional career back in 2003 at Trend Micro. From then, he has shared his knowledge in reverse engineering and developed relevant malware-related systems with big companies such as eSoft, Sunbelt/GFI/ThreatTrack, NSSlabs, and currently Microsoft. He has been invited to be a speaker at conferences, educational institutions, and government sectors concerning malware and ways to efficiently subvert its progress.

Chiheb Chebbi is a Tunisian InfoSec enthusiast, author, and technical reviewer with experience of various aspects of information security, focusing on investigating advanced cyber attacks and researching cyber espionage. His core interests lie in penetration testing, machine learning, and threat hunting. He has been included in many Halls Of Fame. His talk proposals have been accepted by many world-class information security conferences.

I dedicate this book to every person who makes the security community awesome and fun!
What this book covers

, Preparing to Reverse , shows how to o btain the samples used throughout the book and explains the journey we are about to embark on.

, Identification and Extraction of Hidden Components, covers basics of the operating system and malware installation behavior. We will learn where malware usually drops files and makes registry entries.

, The Low-Level Language, briefly covers the Assembly language and why we must understand it in order to reverse engineer.

, Static and Dynamic Reversing , explains how static and dynamic analysis are implemented. We will also have a brief discussion regarding reversing of a file using a few tools.

, Tools of the Trade , c ompares and contrasts tools of the trade and explains their weaknesses and when a tool won't work as intended, allowing you to change your tools and know where to turn to get the job done without blaming a tool for lacking a capability.

, RE in Linux Platforms , explains how to perform a static and dynamic Windows analysis in a Linux environment.

, RE for Windows Platforms , explains how to perform static and dynamic Windows analysis directly in a Windows environment.

, Sandboxing: Virtualization as a Component for RE , shows how to u se emulation to inform reverse engineering and overcome obstacles when running on hardware other than the target binary supports.

, Binary Obfuscation Techniques , explains how to reverse engineer simple obfuscation techniques.

, Packing and Encryption , covers u sing debuggers to pause execution and dump the contents of memory for analysis using our disassembly tools.

, Anti-analysis tricks, shows how to identify and handle anti-reversing and anti-debugging tricks.

, Practical Reverse Engineering of a Windows Executable , covers practical use of the tools we are familiar with at this point.

, Reversing Various File Types, covers analyzing various file types using up-to-date tools.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Mastering reverse engineering: re-engineer your ethical hacking skills»

Look at similar books to Mastering reverse engineering: re-engineer your ethical hacking skills. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Mastering reverse engineering: re-engineer your ethical hacking skills»

Discussion, reviews of the book Mastering reverse engineering: re-engineer your ethical hacking skills and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.