Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation (Paperback)
暫譯: 實用逆向工程:x86、x64、ARM、Windows 核心、逆向工具與混淆技術(平裝本)

Bruce Dang

買這商品的人也買了...

商品描述

Analyzing how hacks are done, so as to stop them in the future

Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks.

The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples.

  • Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examples
  • Covers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniques
  • Provides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by step
  • Demystifies topics that have a steep learning curve
  • Includes a bonus chapter on reverse engineering tools

Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals.

商品描述(中文翻譯)

分析駭客如何進行攻擊,以便未來能夠阻止他們
反向工程是分析硬體或軟體並理解其運作的過程,而無需訪問源代碼或設計文件。駭客能夠反向工程系統並利用他們所發現的漏洞,結果往往令人不安。現在,正義的一方也可以使用相同的工具來抵禦這些威脅。實用反向工程深入探討反向工程的技術,針對安全分析師、安全工程師和系統程式設計師,讓他們學會如何使用這些相同的過程來阻止駭客的攻擊。

本書涵蓋了 x86、x64 和 ARM(首本涵蓋這三者的書籍);Windows 核心模式代碼的 rootkits 和驅動程式;虛擬機保護技術;以及更多內容。最重要的是,它提供了一種系統化的方法來學習這些材料,並包含大量的實作練習和真實案例。


  • 提供系統化的反向工程理解方法,並包含實作練習和真實案例

  • 涵蓋 x86、x64 和先進的 RISC 機器(ARM)架構,以及去混淆和虛擬機保護技術

  • 特別介紹 Windows 核心模式代碼(rootkits/驅動程式),這是一個在其他地方不常見的主題,並逐步解釋如何分析驅動程式

  • 解釋學習曲線陡峭的主題

  • 包括一章關於反向工程工具的附加內容

實用反向工程:使用 x86、x64、ARM、Windows 核心和反向工具為廣泛的 IT 專業人士提供了關鍵的、最新的指導。

最後瀏覽商品 (1)