• Complain

Jitender Narula - Implementing Reverse Engineering

Here you can read online Jitender Narula - Implementing Reverse Engineering full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: BPB Publications, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Implementing Reverse Engineering
  • Author:
  • Publisher:
    BPB Publications
  • Genre:
  • Year:
    2021
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Implementing Reverse Engineering: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Implementing Reverse Engineering" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

More practical less theory

Key Features

In-depth practical demonstration with multiple examples of reverse engineering concepts.

Provides a step-by-step approach to reverse engineering, including assembly instructions.

Reverse engineering strategies for simple-to-complex applications like Wannacry ransomware and Windows calculator.

Description

The book Implementing Reverse Engineering begins with a step-by-step explanation of the fundamentals of reverse engineering. You will learn how to use reverse engineering to find bugs and hacks in real-world applications. This book is divided into three sections. The first section is an exploration of the reverse engineering process. The second section explains reverse engineering of applications, and the third section is a collection of real-world use-cases with solutions.

The first section introduces the basic concepts of a computing system and the data building blocks of the computing system. This section also includes open-source tools such as CFF Explorer, Ghidra, Cutter, and x32dbg. The second section goes over various reverse engineering practicals on various applications to give users hands-on experience.

What you will learn

Understand different code calling conventions like CDECL, STDCALL, and FASTCALL with practical illustrations.

Analyze and break WannaCry ransomware using Ghidra.

Hack the Windows calculator to modify its behavior.

Who this book is for

This book is for cybersecurity researchers, bug bounty hunters, software developers, software testers, and software quality assurance experts who want to perform reverse engineering for advanced security from attacks. Interested readers can also be from high schools or universities (with a Computer Science background).

Table of Contents

1. Impact of Reverse Engineering

2. Understanding Architecture of x86 machines

3. Up and Running with Reverse Engineering tools

4. Walkthrough on Assembly Instructions

5. Types of Code Calling Conventions

6. Reverse Engineering Pattern of Basic Code

7. Reverse Engineering Pattern of the printf() Program

8. Reverse Engineering Pattern of the Pointer Program

9. Reverse Engineering Pattern of the Decision Control Structure

10. Reverse Engineering Pattern of the Loop Control Structure

11. Array Code Pattern in Reverse Engineering

12. Structure Code Pattern in Reverse Engineering

13. Scanf Program Pattern in Reverse Engineering

14. Strcpy Program Pattern in Reverse Engineering

15. Simple Interest Code Pattern in Reverse Engineering

16. Breaking Wannacry Ransomware with Reverse Engineering

17. Generate Pseudo Code from the Binary File

18. Fun with Windows Calculator Using Reverse Engineering

About the Authors

Jitender Narula is an experienced Cyber Security Specialist currently associated with the International Institute of Cyber Security (www.iicybersecurity.com) having 18+ years of industry experience. He has many years of cybersecurity experience with the government and the corporate world. In India, he has worked for law enforcement agencies (LEA), government entities like Delhi Police, ICAI (Institute of Chartered Accountants of India), Delhi University, and private organizations.

LinkedIn Profile: https://in.linkedin.com/in/jitender-narula-7146123

Blog Link:https://www.securitynewspaper.com/2020/04/24/employee-data-leaked-apple-google-microsoftlinkedin-intel-cisco-verizon-oracle-hp-nvidia-affected/

Jitender Narula: author's other books


Who wrote Implementing Reverse Engineering? Find out the surname, the name of the author of the book and a list of all author's works by series.

Implementing Reverse Engineering — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Implementing Reverse Engineering" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Implementing Reverse Engineering The Real Practice of x86 Internals - photo 1
Implementing
Reverse
Engineering
The Real Practice of x86 Internals Code Calling Conventions Ransomware - photo 2
The Real Practice of x86 Internals, Code Calling
Conventions, Ransomware Decryption, Application
Cracking, Assembly Language, and Proven
Cybersecurity Open Source Tools
Implementing Reverse Engineering - image 3
Jitender Narula
Implementing Reverse Engineering - image 4
www.bpbonline.com
FIRST EDITION 2022
Copyright BPB Publications, India
ISBN: 978-93-91030-377
All Rights Reserved. No part of this publication may be reproduced, distributed or transmitted in any form or by any means or stored in a database or retrieval system, without the prior written permission of the publisher with the exception to the program listings which may be entered, stored and executed in a computer system, but they can not be reproduced by the means of publication, photocopy, recording, or by any electronic and mechanical means.
LIMITS OF LIABILITY AND DISCLAIMER OF WARRANTY
The information contained in this book is true to correct and the best of authors and publishers knowledge. The author has made every effort to ensure the accuracy of these publications, but publisher cannot be held responsible for any loss or damage arising from any information in this book.
All trademarks referred to in the book are acknowledged as properties of their respective owners but BPB Publications cannot guarantee the accuracy of this information.
wwwbpbonlinecom Dedicated to My parents Always seen God in them - photo 5
www.bpbonline.com
Dedicated to
My parents
Always seen God in them
About the Author
Jitender Narula is an experienced Cyber Security Specialist currently associated with International Institute of Cyber Security having over years of industry experience. He has many years of cyber security experience with governments and corporate world. In India, he has worked with government entities like Delhi Police, ICAI (Institute of Chartered Accountants of India), Delhi University and other private organizations.
He has worked on the projects of AT&T, Citrix, Google, Conexant, IPolicy Networks (Tech Mahindra now), Narus (a wholly owned subsidiary of The Boeing Company) and HFCL. Apart from this, he has conducted training programs for various corporate and government officials in India and Mexico.
He has published articles, research information and interviews in the area of cyber security for Information Security Newspaper Noticias de seguridad informtica Cibertip - Noticias de Hacking Exploit One iicybersecurity blog and also contributed to the Vishvas News, which is part of Dainik Jagran (Indian language daily newspaper).
About the Reviewer
Sanil Nadkarni is CISO /CRO/DPO in an MNC. He has worked for organizations and clients such as Microsoft, Symantec, MphasiS, Capita, SLK and has supported International Banks and Financial Organizations.
He is an international speaker, author and trainer. Sanil has published over articles online and also for various magazines.
His certifications include CFE, CISSP, CISA, CISM, Security+, ISO 27001 LA, ISO 22301 LA, A+, N+, MCP, MCSA, CCNA, SCSA, ISO 10012 (GDPR), RHCE, CEH,CBCP, ISO 31000 Risk and Microsoft Azure Architect.
Sanil has received honors and awards such as CISO TOP Award, Dynamic CISO Award, Top CIO award and many more.
He has published a book on Fundamentals on Information Security which is available on Amazon.
Acknowledgement
First and foremost, praises and thanks to my Dad, Mom and God for showering blessings throughout my work to complete the book successfully.
I would like to express my deep and sincere gratitude to Atul Narula, my colleague at International Institute of Cyber Security, Mexico for helping with the review process of this book. I am extremely grateful for what he has offered me. I would also like to thank him for his friendship, empathy and great sense of humor.
I am extremely grateful to my parents (Ramesh Narula and Mohini Narula) for their love, prayers, care and sacrifices for educating and preparing me for my future. I am very much thankful to my wife and son for their love, understanding, prayers and continuing support to complete this book. Also, I would like to express my thanks to Dr. Shilpi Sahi and Om Narula for their support and motivation throughout this process of writing. Once again, I would like to thank my family for putting up with me while I was spending many nights writingI could have never completed this book without their support.
Finally, I would like to thanks BPB Publications for giving me the opportunity to write my first book for them.
Preface
Reverse Engineering (RE) is an art of understanding any program code when no source code is available. This book provides step-by-step explanation of the essential concepts and practical examples to understand and implement Reverse Engineering. It will enable the readers to understand the application code flow to identify vulnerabilities and bugs in the application.
This book is for the readers who want to start learning Reverse Engineering from basics in a step-by-step manner. The book is divided into three parts:
Exploring Reverse Engineering
Reverse Engineering Applications
Real World Examples with Solutions
The first part Exploring Reverse Engineering starts with the basic concepts of Computing System and Data Building Blocks of the Computing System. This part also enlists open-source tools required for RE applications and the programming instructions of RE. The second part Reverse Engineering Applications walks us through the different applications/programs to understand the implementation of RE. This part covers various practicals, which give the users a hands-on experience. All the applications/programs mentioned in this part are aligned in a systematic manner; from reverse engineering of basic C/C++ programs to complex C/C++ programs. In the third part Real World Examples and Solutions of this book, RE of well-known Windows application along with different exercises are demonstrated in a step-by-step manner. Over the chapters in this book, you will learn the following:
PART 1: Exploring Reverse Engineering
In this part, the readers will understand the impact of RE on industry, building blocks of x86 computing system and the role of each in the overall functioning of x86 system.
Chapter talks about the impact of RE on IT industry and how it originated as an area.
Chapter talks about the building blocks of a computing system and the role of each building block in the overall functioning of the system. This chapter is important in order to understand the core concept behind the working of x86 computing systems.
Chapter focuses on the open-source tools used in RE and how these tools are used for debugging and analysis. These tools will be used in all illustrations shown in this book.
Chapter explains about the major assembly instructions used and also about how different instructions are segmented in various sections for easy understanding along with examples.
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Implementing Reverse Engineering»

Look at similar books to Implementing Reverse Engineering. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Implementing Reverse Engineering»

Discussion, reviews of the book Implementing Reverse Engineering and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.