logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Implementing Reverse Engineering: The Real Practice of X86 Internals, Code Calling Conventions, Ransomware Decryption, Application Cracking, Assembly Language, ... Open Source Tools (English Edition) by Jitender Narula

  • SKU: EBN-46539008
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

0.0

0 reviews
Instant download (eBook) Implementing Reverse Engineering: The Real Practice of X86 Internals, Code Calling Conventions, Ransomware Decryption, Application Cracking, Assembly Language, ... Open Source Tools (English Edition) after payment.
Authors:Jitender Narula
Year:2021
Editon:1
Publisher:BPB Publications
Language:english
File Size:30.67 MB
Format:pdf
Categories: Ebooks

Product desciption

(Ebook) Implementing Reverse Engineering: The Real Practice of X86 Internals, Code Calling Conventions, Ransomware Decryption, Application Cracking, Assembly Language, ... Open Source Tools (English Edition) by Jitender Narula

More practical less theoryKey Features● In-depth practical demonstration with multiple examples of reverse engineering concepts.● Provides a step-by-step approach to reverse engineering, including assembly instructions.● Helps security researchers to crack application code and logic using reverse engineering open source tools. ● Reverse engineering strategies for simple-to-complex applications like Wannacry ransomware and Windows calculator.DescriptionThe book ‘Implementing Reverse Engineering’ begins with a step-by-step explanation of the fundamentals of reverse engineering. You will learn how to use reverse engineering to find bugs and hacks in real-world applications. This book is divided into three sections. The first section is an exploration of the reverse engineering process. The second section explains reverse engineering of applications, and the third section is a collection of real-world use-cases with solutions.The first section introduces the basic concepts of a computing system and the data building blocks of the computing system. This section also includes open-source tools such as CFF Explorer, Ghidra, Cutter, and x32dbg. The second section goes over various reverse engineering practicals on various applications to give users hands-on experience. In the third section, reverse engineering of Wannacry ransomware, a well-known Windows application, and various exercises are demonstrated step by step.What you will learn● Understand different code calling conventions like CDECL, STDCALL, and FASTCALL with practical illustrations.● Analyze and break WannaCry ransomware using Ghidra.● Using Cutter, reconstruct application logic from the assembly code.● Hack the Windows calculator to modify its behavior.Who this book is forThis book is for cybersecurity researchers, bug bounty hunters, software developers, software testers, and software quality assurance experts who want to perform reverse engineering for advanced security from attacks. Interested readers can also be from high schools or universities (with a Computer Science background). Basic programming knowledge is helpful but not required.Table of Contents1. Impact of Reverse Engineering2. Understanding Architecture of x86 machines3. Up and Running with Reverse Engineering tools4. Walkthrough on Assembly Instructions5. Types of Code Calling Conventions6. Reverse Engineering Pattern of Basic Code7. Reverse Engineering Pattern of the printf() Program8. Reverse Engineering Pattern of the Pointer Program9. Reverse Engineering Pattern of the Decision Control Structure10. Reverse Engineering Pattern of the Loop Control Structure11. Array Code Pattern in Reverse Engineering12. Structure Code Pattern in Reverse Engineering13. Scanf Program Pattern in Reverse Engineering14. strcpy Program Pattern in Reverse Engineering15. Simple Interest Code Pattern in Reverse Engineering16. Breaking Wannacry Ransomware with Reverse Engineering17. Generate Pseudo Code from the Binary File18. Fun with Windows Calculator Using Reverse EngineeringAbout the AuthorJitender Narulais an experienced Cyber Security Specialist currently associated with the International Institute of Cyber Security (www.iicybersecurity.com) having 18+ years of industry experience. He has many years of cybersecurity experience with the government and the corporate world. In India, he has worked for law enforcement agencies (LEA), government entities like Delhi Police, ICAI (Institute of Chartered Accountants of India), Delhi University, and private organizations.LinkedIn Profile: https://in.linkedin.com/in/jitender-narula-7146123Blog Link: https://www.securitynewspaper.com/2020/04/24/employee-data-leaked-apple-google-microsoftlinkedin-intel-cisco-verizon-oracle-hp-nvidia-affected/
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products