Cover image for Reversing : Secrets of Reverse Engineering.
Reversing : Secrets of Reverse Engineering.
Title:
Reversing : Secrets of Reverse Engineering.
Author:
Eilam, Eldad.
ISBN:
9780764597688
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (619 pages)
Contents:
Reversing: Secrets of Reverse Engineering -- Credits -- Foreword -- Acknowledgments -- Contents -- Introduction -- Reverse Engineering and Low-Level Software -- How This Book Is Organized -- Who Should Read this Book -- Tools and Platforms -- What's on the Web Site -- Where to Go from Here? -- What Is Reverse Engineering? -- Part I: Reversing 101 -- Chapter 1: Foundations -- Software Reverse Engineering: Reversing -- Reversing Applications -- Low-Level Software -- The Reversing Process -- The Tools -- Is Reversing Legal? -- Code Samples & Tools -- Conclusion -- Chapter 2: Low-Level Software -- High-Level Perspectives -- Low-Level Perspectives -- Assembly Language 101 -- A Primer on Compilers and Compilation -- Execution Environments -- Conclusion -- Chapter 3: Windows Fundamentals -- Components and Basic Architecture -- Memory Management -- Objects and Handles -- Processes and Threads -- Application Programming Interfaces -- Executable Formats -- Input and Output -- Structured Exception Handling -- Conclusion -- Chapter 4: Reversing Tools -- Different Reversing Approaches -- Disassemblers -- Debuggers -- Decompilers -- System-Monitoring Tools -- Patching Tools -- Miscellaneous Reversing Tools -- Conclusion -- Part II: Applied Reversing -- Chapter 5: Beyond the Documentation -- Reversing and Interoperability -- Laying the Ground Rules -- Locating Undocumented APIs -- Case Study: The Generic Table API in NTDLL.DLL -- Conclusion -- Chapter 6: Deciphering File Formats -- Cryptex -- Using Cryptex -- Reversing Cryptex -- The Password Verification Process -- The Directory Layout -- Dumping the Directory Layout -- The File Extraction Process -- The Big Picture -- Digging Deeper -- Conclusion -- Chapter 7: Auditing Program Binaries -- Defining the Problem -- Vulnerabilities -- Case-Study: The IIS Indexing Service Vulnerability -- Conclusion.

Chapter 8: Reversing Malware -- Types of Malware -- Sticky Software -- Future Malware -- Uses of Malware -- Malware Vulnerability -- Polymorphism -- Metamorphism -- Establishing a Secure Environment -- The Backdoor.Hacarmy.D -- The Backdoor.Hacarmy.D: A Command Reference -- Conclusion -- Part III: Cracking -- Chapter 9: Piracy and Copy Protection -- Copyrights in the New World -- The Social Aspect -- Software Piracy -- Types of Protection -- Advanced Protection Concepts -- Digital Rights Management -- Watermarking -- Trusted Computing -- Attacking Copy Protection Technologies -- Conclusion -- Chapter 10: Antireversing Techniques -- Why Antireversing? -- Basic Approaches to Antireversing -- Eliminating Symbolic Information -- Code Encryption -- Active Antidebugger Techniques -- Confusing Disassemblers -- Code Obfuscation -- Control Flow Transformations -- Data Transformations -- Conclusion -- Chapter 11: Breaking Protections -- Patching -- Keygenning -- Ripping Key-Generation Algorithms -- Advanced Cracking: Defender -- Protection Technologies in Defender -- Conclusion -- Part IV: Beyond Disassembly -- Chapter 12: Reversing .NET -- Ground Rules -- .NET Basics -- Intermediate Language (IL) -- Decompilers -- Obfuscators -- Reversing Obfuscated Code -- Conclusion -- Native Code Decompilation: An Unsolvable Problem? -- Chapter 13: Decompilation -- Typical Decompiler Architecture -- Intermediate Representations -- The Front End -- Code Analysis -- The Back End -- Real-World IA-32 Decompilation -- Conclusion -- Understanding Low-Level Logic -- Appendix A: Deciphering Code Structures -- Control Flow & Program Layout -- Branchless Logic -- Effects of Working-Set Tuning on Reversing -- Arithmetic Flags -- Appendix B: Understanding Compiled Arithmetic -- Basic Integer Arithmetic -- 64-Bit Arithmetic -- Type Conversions -- Appendix C: Deciphering Program Data.

The Stack -- Basic Data Constructs -- Data Structures -- Classes -- Index.
Abstract:
Eldad Eilam is a consultant in the field of reverse engineering. He assists clients with operating system and in-depth software reverse engineering, and has devoted several years to developing advanced reverse engineering techniques.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: