Coverart for item
The Resource Reverse engineering code with IDA Pro, Justin Ferguson ... [et al. ; Dan Kaminsky, technical editor and contributing author]

Reverse engineering code with IDA Pro, Justin Ferguson ... [et al. ; Dan Kaminsky, technical editor and contributing author]

Label
Reverse engineering code with IDA Pro
Title
Reverse engineering code with IDA Pro
Statement of responsibility
Justin Ferguson ... [et al. ; Dan Kaminsky, technical editor and contributing author]
Title variation
RE code with IDA Pro
Contributor
Subject
Language
eng
Summary
If you want to master the art and science of reverse engineering code with IDA Pro for security R & D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pro's interactive interface and programmable development language provide you with complete control over code disassembly and debugging. This is the only book which focuses exclusively on the world's most powerful and popular took for reverse engineering code. *Reverse Engineer REAL Hostile Code To follow along with this chapter, you must download a file called!DANGER!INFECTEDMALWARE!DANGER! ... 'nuff said. *Download the Code! The companion Web site to this book offers up really evil code for you to reverse engineer and really nice code for you to automate tasks with the IDC Scripting Language. *Portable Executable (PE) and Executable and Linking Formats (ELF) Understand the physical layout of PE and ELF files, and analyze the components that are essential to reverse engineering. *Break Hostile Code Armor and Write your own Exploits Understand execution flow, trace functions, recover hard coded passwords, find vulnerable functions, backtrace execution, and craft a buffer overflow. *Master Debugging Debug in IDA Pro, use a debugger while reverse engineering, perform heap and stack access modification, and use other debuggers. *Stop Anti-Reversing Anti-reversing, like reverse engineering or coding in assembly, is an art form. The trick of course is to try to stop the person reversing the application. Find out how! *Track a Protocol through a Binary and Recover its Message Structure Trace execution flow from a read event, determine the structure of a protocol, determine if the protocol has any undocumented messages, and use IDA Pro to determine the functions that process a particular message. *Develop IDA Scripts and Plug-ins Learn the basics of IDA scripting and syntax, and write IDC scripts and plug-ins to automate even the most complex tasks
Cataloging source
OPELS
Dewey number
005.1/4
Illustrations
illustrations
Index
index present
LC call number
QA76.76.D57
LC item number
R49 2008eb
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • Ferguson, Justin
  • Kaminsky, Dan
http://library.link/vocab/subjectName
  • Debugging in computer science
  • Computer security
  • Reverse engineering
  • COMPUTERS
  • Computer security
  • Debugging in computer science
Label
Reverse engineering code with IDA Pro, Justin Ferguson ... [et al. ; Dan Kaminsky, technical editor and contributing author]
Instantiates
Publication
Note
Includes index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Chapter 1: Introduction -- Chapter 2: Assembly and Reverse Engineering Basics -- Chapter 3: Portable Executable and Executable and Linking Formats -- Chapter 4: Walkthroughs One and Two -- Chapter 5: Debugging -- Chapter 6: Anti-Reversing -- Chapter 7: Walkthrough Four -- Chapter 8: Advanced Walkthrough -- Chapter 9: IDA Scripting and Plug-ins -- Index
Control code
272383172
Dimensions
unknown
Extent
1 online resource (xii, 316 pages)
Form of item
online
Isbn
9780080558790
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations
http://library.link/vocab/ext/overdrive/overdriveId
141976:142122
Specific material designation
remote
System control number
(OCoLC)272383172
Label
Reverse engineering code with IDA Pro, Justin Ferguson ... [et al. ; Dan Kaminsky, technical editor and contributing author]
Publication
Note
Includes index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Chapter 1: Introduction -- Chapter 2: Assembly and Reverse Engineering Basics -- Chapter 3: Portable Executable and Executable and Linking Formats -- Chapter 4: Walkthroughs One and Two -- Chapter 5: Debugging -- Chapter 6: Anti-Reversing -- Chapter 7: Walkthrough Four -- Chapter 8: Advanced Walkthrough -- Chapter 9: IDA Scripting and Plug-ins -- Index
Control code
272383172
Dimensions
unknown
Extent
1 online resource (xii, 316 pages)
Form of item
online
Isbn
9780080558790
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations
http://library.link/vocab/ext/overdrive/overdriveId
141976:142122
Specific material designation
remote
System control number
(OCoLC)272383172

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...