Nicht aus der Schweiz? Besuchen Sie lehmanns.de

x86 Software Reverse-Engineering, Cracking, and Counter-Measures (eBook)

eBook Download: PDF
2024
John Wiley & Sons (Verlag)
978-1-394-19990-7 (ISBN)

Lese- und Medienproben

x86 Software Reverse-Engineering, Cracking, and Counter-Measures - Stephanie Domas, Christopher Domas
Systemvoraussetzungen
46,99 inkl. MwSt
(CHF 45,90)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
A crystal-clear and practical blueprint to software disassembly x86 Software Reverse-Engineering, Cracking, and Counter-Measures is centered around the world of disassembling software. It will start with the basics of the x86 assembly language, and progress to how that knowledge empowers you to reverse-engineer and circumvent software protections. No knowledge of assembly, reverse engineering, or software cracking is required. The book begins with a bootcamp on x86, learning how to read, write, and build in the assembly that powers a massive amount of the world s computers. Then the book will shift to reverse engineering applications using a handful of industry favorites such as IDA, Ghidra, Olly, and more. Next, we move to cracking with techniques such as patching and key generation, all harnessing the power of assembly and reverse engineering. Lastly, we ll examine cracking from a defensive perspective. Providing learners with techniques to be a better defender of their own software, or knowledge to crack these techniques more effectively. Assembly: computer Architecture, x86, system calls, building and linking, ASCII, condition codes, GDB, control flow, stack, calling conventions Reverse Engineering: reconnaissance, strings, RE strategy, stripping, linking, optimizations, compilers, industry tools Cracking: patching, key checkers, key generators, resource hacking, dependency walking Defense: anti-debugging, anti-tamper, packing, cryptors/decryptors, whitelist, blacklist, RASP, code signing, obfuscationA practical and hands-on resource for security professionals to hobbyists, this book is for anyone who wants to learn to take apart, understand, and modify black-box software. x86 Software Reverse-Engineering, Cracking, and Counter-Measures is a vital resource for security researchers, reverse engineers and defenders who analyze, research, crack or defend software applications.

STEPHANIE DOMAS is the CISO of Canonical, where she is driving Canonical to be the most trusted computational partner in all of open source. Prior to that she was the Chief Security Technology Strategist at Intel where she owned the cross-Intel security technology strategy across Intel's wide portfolio of products. Stephanie is a passionate educator, strategist, speaker, advisor, and security enthusiast. CHRISTOPHER DOMAS is a security researcher primarily focused on firmware, hardware, and low level processor exploitation. He is best known for releasing impractical solutions to non-existent problems, including the world's first single instruction C compiler (M/o/Vfuscator), toolchains for generating images in program control flow graphs (REpsych), and Turing-machines in the vi text editor.

Introduction xxiii

Chapter 1 Decompilation and Architecture 1

Chapter 2 x86 Assembly: Data, Modes, Registers, and Memory Access 13

Chapter 3 x86 Assembly: Instructions 31

Chapter 4 Building and Running Assembly Programs 43

Chapter 5 Understanding Condition Codes 57

Chapter 6 Analyzing and Debugging Assembly Code 65

Chapter 7 Functions and Control Flow 77

Chapter 8 Compilers and Optimizers 127

Chapter 9 Reverse Engineering: Tools and Strategies 137

Chapter 10 Cracking: Tools and Strategies 147

Chapter 11 Patching and Advanced Tooling 179

Chapter 12 Defense 203

Chapter 13 Advanced Defensive Techniques 217

Chapter 14 Detection and Prevention 229

Chapter 15 Legal 239

Chapter 16 Advanced Techniques 245

Chapter 17 Bonus Topics 251

Conclusion 271

Index 273

Erscheint lt. Verlag 2.1.2024
Reihe/Serie Tech Today
Tech Today
Sprache englisch
Themenwelt Mathematik / Informatik Informatik Theorie / Studium
Schlagworte Computer Science • Computer Security & Cryptography • Computersicherheit u. Kryptographie • Informatik • Programmierung u. Software-Entwicklung • Programming & Software Development • Reverse Engineering • software cracking • software cracking defense • Software disassembly • software reverse engineering • software reverse-engineering protection • x86 assembly • x86 cracking • x86 reverse engineering • x86 software
ISBN-10 1-394-19990-2 / 1394199902
ISBN-13 978-1-394-19990-7 / 9781394199907
Haben Sie eine Frage zum Produkt?
PDFPDF (Ohne DRM)

Digital Rights Management: ohne DRM
Dieses eBook enthält kein DRM oder Kopier­schutz. Eine Weiter­gabe an Dritte ist jedoch rechtlich nicht zulässig, weil Sie beim Kauf nur die Rechte an der persön­lichen Nutzung erwerben.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Discover tactics to decrease churn and expand revenue

von Jeff Mar; Peter Armaly

eBook Download (2024)
Packt Publishing (Verlag)
CHF 24,60