Preface
This is a basic book that enables you to read a single line of C code and then be able to calculate the distribution of dynamic and static memory in your head and write the executable hexadecimal content by hand on a whiteboard.
This book distills three aspects of reverse engineering, compilers, and system practice principles into a practical study of Windows cyberattacks, and explains the attack techniques from a red team perspective, which have been used by national cyber armies in recent years on the solid foundation of PE attack techniques.
This book covers practical examples of malware and online game hacking, such as EXE infection, shellcode development, software packer, UAC bypass, path parser vulnerabilities, and digital signature forgery.