Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Kali Linux 2:  Windows Penetration Testing

You're reading from   Kali Linux 2: Windows Penetration Testing Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers

Arrow left icon
Product type Paperback
Published in Jun 2016
Publisher Packt
ISBN-13 9781782168492
Length 422 pages
Edition 1st Edition
Arrow right icon
Toc

Table of Contents (12) Chapters Close

Preface 1. Sharpening the Saw FREE CHAPTER 2. Information Gathering and Vulnerability Assessment 3. Exploitation Tools (Pwnage) 4. Web Application Exploitation 5. Sniffing and Spoofing 6. Password Attacks 7. Windows Privilege Escalation 8. Maintaining Remote Access 9. Reverse Engineering and Stress Testing 10. Forensics Index

Reverse engineering theory


Theory scares IT professionals for some reason. This is not truly warranted, as theory is the underlying bedrock of all of your troubleshooting. It may be the axioms you have learned through your X years of hard-knocks trial and error. In the land of qualitative research, this is literally called the Grounded Theory Research Method. The base theory for reverse engineering is that the outputs infer the interior behavior of the application. When you are faced with a piece of malware, you are going to start making working hypotheses from a mixture of the following:

  • Prior knowledge from recalled interactions with malware perceived as similar

  • Generalizing perceived outcomes of interactions with the malware under test

Tip

Hacker Tip

It is probably not useful to label an application in an a priori manner. It may mask data to apply the "if it walks like a duck and quacks like a duck, it is probably a duck" axiom to the application. Especially with malware, it is likely that...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime