| Digital List Price: | $26.99 |
| Kindle Price: | $16.54 Save $10.45 (39%) |
| Sold by: | Amazon.com Services LLC |
Your Memberships & Subscriptions
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required. Learn more
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Binary Analysis Cookbook: Actionable recipes for disassembling and analyzing binaries for security risks 1st Edition, Kindle Edition
| Price | New from | Used from |
- Kindle
$16.54 Read with Our Free App - Paperback
$36.993 Used from $64.87 8 New from $36.99
Explore open-source Linux tools and advanced binary analysis techniques to analyze malware, identify vulnerabilities in code, and mitigate information security risks
Key Features
- Adopt a methodological approach to binary ELF analysis on Linux
- Learn how to disassemble binaries and understand disassembled code
- Discover how and when to patch a malicious binary during analysis
Book Description
Binary analysis is the process of examining a binary program to determine information security actions. It is a complex, constantly evolving, and challenging topic that crosses over into several domains of information technology and security.
This binary analysis book is designed to help you get started with the basics, before gradually advancing to challenging topics. Using a recipe-based approach, this book guides you through building a lab of virtual machines and installing tools to analyze binaries effectively. You'll begin by learning about the IA32 and ELF32 as well as IA64 and ELF64 specifications. The book will then guide you in developing a methodology and exploring a variety of tools for Linux binary analysis. As you advance, you'll learn how to analyze malicious 32-bit and 64-bit binaries and identify vulnerabilities. You'll even examine obfuscation and anti-analysis techniques, analyze polymorphed malicious binaries, and get a high-level overview of dynamic taint analysis and binary instrumentation concepts.
By the end of the book, you'll have gained comprehensive insights into binary analysis concepts and have developed the foundational skills to confidently delve into the realm of binary analysis.
What you will learn
- Traverse the IA32, IA64, and ELF specifications
- Explore Linux tools to disassemble ELF binaries
- Identify vulnerabilities in 32-bit and 64-bit binaries
- Discover actionable solutions to overcome the limitations in analyzing ELF binaries
- Interpret the output of Linux tools to identify security risks in binaries
- Understand how dynamic taint analysis works
Who this book is for
This book is for anyone looking to learn how to dissect ELF binaries using open-source tools available in Linux. If you’re a Linux system administrator or information security professional, you’ll find this guide useful. Basic knowledge of Linux, familiarity with virtualization technologies and the working of network sockets, and experience in basic Python or Bash scripting will assist you with understanding the concepts in this book
Table of Contents
- Setting Up The Lab
- 32-bit Assembly on Linux And The ELF Specification
- 64-bit Assembly on Linux and the ELF Specification
- Creating A Binary Analysis Methodology
- Linux Tools for Binary Analysis
- Analyzing A Simple Bind Shell
- Analyzing A Simple Reverse Shell
- Identifying Vulnerabilities
- Understanding Anti-Analysis Techniques
- A Simple Reverse Shell With Polymorphism
- Appendix: Dynamic Taint Analysis - the 30,000 Foot View
- ISBN-13978-1789807608
- Edition1st
- PublisherPackt Publishing
- Publication dateSeptember 20, 2019
- LanguageEnglish
- File size20234 KB
Customers who read this book also read
Editorial Reviews
Review
About the Author
industry certifications and has co-taught offensive-focused Python programming classes at
OWASP AppSec USA, and AppSec Europe. He enjoys coding in Python, IA32, IA64,
PowerShell, participating in, and designing, capture the flag (CTF) challenges, teaching
and mentoring others looking to embark on a career in information security, and presenting
on various information security topics at local chapters of well-known information security
groups. Michael has served on the chapter board for his local OWASP chapter, is a lifetime
OWASP member, and participates in the local DC402 group.
Product details
- ASIN : B07XYVJ3LN
- Publisher : Packt Publishing; 1st edition (September 20, 2019)
- Publication date : September 20, 2019
- Language : English
- File size : 20234 KB
- Text-to-Speech : Enabled
- Screen Reader : Supported
- Enhanced typesetting : Enabled
- X-Ray : Not Enabled
- Word Wise : Not Enabled
- Sticky notes : On Kindle Scribe
- Print length : 398 pages
- Best Sellers Rank: #1,889,079 in Kindle Store (See Top 100 in Kindle Store)
- #208 in Linux & UNIX Administration (Kindle Store)
- #290 in Viruses & Malware
- #361 in Unix Computer Operating Systems
- Customer Reviews:
About the author

Michael currently works as a Director of Security Consulting for a Cloud Security Services provider in the United States. He enjoys hacking, reverse engineering, participating in capture the flag (ctf) competitions at conferences, and coding in Python, C, and Intel Assembly on Linux. Mr. Born participates in his local OWASP and DEFCON groups, has presented and volunteered at Kernelcon, and has co-taught an offensive-focused Python scripting class at OWASP AppSec USA and AppSec EU security conferences.
When not working, Michael enjoys learning new topics within Information Security, listening to music, bicycling, spending time with his family and friends, participating in tactical training, shooting, and has a passion for mentoring people interested in breaking into the Information Security industry as a career.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonReviews with images
Submit a report
- Harassment, profanity
- Spam, advertisement, promotions
- Given in exchange for cash, discounts
Sorry, there was an error
Please try again later.-
Top reviews
Top review from the United States
There was a problem filtering reviews right now. Please try again later.
This book did an excellent job of stepping me through reviewing, understanding, and tweaking code to understand what goes on behind the scenes. The chapters are broken in up to slowly ramp up the more challenging items. Each section has code examples for homework and a follow-up discussion. This is perfect for my learning style.
If you are thinking about getting into the field or are already a veteran this should be right on your bookshelf next to Practical Malware Analysis!
Reviewed in the United States on November 6, 2019
This book did an excellent job of stepping me through reviewing, understanding, and tweaking code to understand what goes on behind the scenes. The chapters are broken in up to slowly ramp up the more challenging items. Each section has code examples for homework and a follow-up discussion. This is perfect for my learning style.
If you are thinking about getting into the field or are already a veteran this should be right on your bookshelf next to Practical Malware Analysis!






