Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Mastering Reverse Engineering

You're reading from   Mastering Reverse Engineering Re-engineer your ethical hacking skills

Arrow left icon
Product type Paperback
Published in Oct 2018
Publisher Packt
ISBN-13 9781788838849
Length 436 pages
Edition 1st Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Reginald Wong Reginald Wong
Author Profile Icon Reginald Wong
Reginald Wong
Arrow right icon
View More author details
Toc

Table of Contents (15) Chapters Close

Preface 1. Preparing to Reverse 2. Identification and Extraction of Hidden Components FREE CHAPTER 3. The Low-Level Language 4. Static and Dynamic Reversing 5. Tools of the Trade 6. RE in Linux Platforms 7. RE for Windows Platforms 8. Sandboxing - Virtualization as a Component for RE 9. Binary Obfuscation Techniques 10. Packing and Encryption 11. Anti-analysis Tricks 12. Practical Reverse Engineering of a Windows Executable 13. Reversing Various File Types 14. Other Books You May Enjoy

What this book covers

Chapter 1, Preparing to Reverse, shows how to obtain the samples used throughout the book and explains the journey we are about to embark on.

Chapter 2, Identification and Extraction of Hidden Components, covers basics of the operating system and malware installation behavior. We will learn where malware usually drops files and makes registry entries.

Chapter 3, The Low-Level Language, briefly covers the Assembly language and why we must understand it in order to reverse engineer.

Chapter 4, Static and Dynamic Reversing, explains how static and dynamic analysis are implemented. We will also have a brief discussion regarding reversing of a file using a few tools.

Chapter 5, Tools of the Trade, compares and contrasts tools of the trade and explains their weaknesses and when a tool won't work as intended, allowing you to change your tools and know where to turn to get the job done without blaming a tool for lacking a capability.

Chapter 6, RE in Linux Platforms, explains how to perform a static and dynamic Windows analysis in a Linux environment.

Chapter 7, RE for Windows Platforms, explains how to perform static and dynamic Windows analysis directly in a Windows environment.

Chapter 8, Sandboxing: Virtualization as a Component for RE, shows how to use emulation to inform reverse engineering and overcome obstacles when running on hardware other than the target binary supports.

Chapter 9, Binary Obfuscation Techniques, explains how to reverse engineer simple obfuscation techniques.

Chapter 10, Packing and Encryption, covers using debuggers to pause execution and dump the contents of memory for analysis using our disassembly tools.

Chapter 11, Anti-analysis tricks, shows how to identify and handle anti-reversing and anti-debugging tricks.

Chapter 12, Practical Reverse Engineering of a Windows Executable, covers practical use of the tools we are familiar with at this point.

Chapter 13, Reversing Various File Types, covers analyzing various file types using up-to-date tools.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at ₹800/month. Cancel anytime