Enjoy fast, free delivery, exclusive deals, and award-winning movies & TV shows with Prime
Try Prime
and start saving today with fast, free delivery
Amazon Prime includes:
Fast, FREE Delivery is available to Prime members. To join, select "Try Amazon Prime and start saving today with Fast, FREE Delivery" below the Add to Cart button.
Amazon Prime members enjoy:- Cardmembers earn 5% Back at Amazon.com with a Prime Credit Card.
- Unlimited Free Two-Day Delivery
- Streaming of thousands of movies and TV shows with limited ads on Prime Video.
- A Kindle book to borrow for free each month - with no due dates
- Listen to over 2 million songs and hundreds of playlists
- Unlimited photo storage with anywhere access
Important: Your credit card will NOT be charged when you start your free trial or if you cancel during the trial period. If you're happy with Amazon Prime, do nothing. At the end of the free trial, your membership will automatically upgrade to a monthly membership.
Buy new:
-37% $34.80$34.80
Ships from: Amazon.com Sold by: Amazon.com
Save with Used - Good
$29.89$29.89
Ships from: Amazon Sold by: Molly'stuff
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation 1st Edition
Purchase options and add-ons
Analyzing how hacks are done, so as to stop them in the future
Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks.
The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples.
- Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examples
- Covers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniques
- Provides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by step
- Demystifies topics that have a steep learning curve
- Includes a bonus chapter on reverse engineering tools
Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals.
- ISBN-101118787315
- ISBN-13978-1118787311
- Edition1st
- PublisherWiley
- Publication dateFebruary 17, 2014
- LanguageEnglish
- Dimensions7.4 x 0.7 x 9.2 inches
- Print length384 pages
Frequently bought together

Similar items that may ship from close to you
Editorial Reviews
From the Inside Flap
LEARN THE SCIENCE AND CRAFT OF REVERSE ENGINEERING TO FIGHT HACKERS AND ROOTKITS
Criminals increasingly are using malicious software (exploits, viruses, rootkits, etc.) for fraud, denial-of-service, intrusions, and espionage operations. Reverse engineering is the only method to thoroughly dissect and understand such software. So it is no surprise that reverse engineering is one of the most important subjects in information security. Unfortunately, it is often perceived as a mysterious and complex black art. Although reverse engineering is a difficult subject, the authors believe there is a scientific approach to it. Practical Reverse Engineering aims to demystify the art and systematize the reverse-engineering process for students and professionals.
- Discover a unique, systematic approach to reverse engineering that incorporates hands-on analysis with real-world malware
- Find detailed coverage of the three most popular processor architectures: x86, x64, and ARM
- Use this concise, structured treatment of the Windows kernel and kernel-mode drivers, featuring walk-throughs and exercises with real-world rootkits
- Learn sophisticated code-obfuscation techniques, such as those used in virtual machine protections, and how to deobfuscate them using program-analysis techniques
- Discover advanced debugging techniques to automate and streamline the reverse-engineering process
- Apply newly learned concepts with complete walk-throughs and exercises using real-world malware
From the Back Cover
LEARN THE SCIENCE AND CRAFT OF REVERSE ENGINEERING TO FIGHT HACKERS AND ROOTKITS
Criminals increasingly are using malicious software (exploits, viruses, rootkits, etc.) for fraud, denial-of-service, intrusions, and espionage operations. Reverse engineering is the only method to thoroughly dissect and understand such software. So it is no surprise that reverse engineering is one of the most important subjects in information security. Unfortunately, it is often perceived as a mysterious and complex black art. Although reverse engineering is a difficult subject, the authors believe there is a scientific approach to it. Practical Reverse Engineering aims to demystify the art and systematize the reverse-engineering process for students and professionals.
- Discover a unique, systematic approach to reverse engineering that incorporates hands-on analysis with real-world malware
- Find detailed coverage of the three most popular processor architectures: x86, x64, and ARM
- Use this concise, structured treatment of the Windows kernel and kernel-mode drivers, featuring walk-throughs and exercises with real-world rootkits
- Learn sophisticated code-obfuscation techniques, such as those used in virtual machine protections, and how to deobfuscate them using program-analysis techniques
- Discover advanced debugging techniques to automate and streamline the reverse-engineering process
- Apply newly learned concepts with complete walk-throughs and exercises using real-world malware
About the Author
Alexandre Gazet is a senior security researcher at QuarksLab focusing on reverse engineering and software protection.
Elias Bachaalany is a software security engineer at Microsoft.
Product details
- Publisher : Wiley; 1st edition (February 17, 2014)
- Language : English
- Paperback : 384 pages
- ISBN-10 : 1118787315
- ISBN-13 : 978-1118787311
- Item Weight : 1.42 pounds
- Dimensions : 7.4 x 0.7 x 9.2 inches
- Best Sellers Rank: #156,717 in Books (See Top 100 in Books)
- #101 in Computer Hacking
- #105 in Computer Network Security
- #2,973 in Unknown
- Customer Reviews:
About the authors

Discover more of the author’s books, see similar authors, read author blogs and more

Discover more of the author’s books, see similar authors, read author blogs and more

Discover more of the author’s books, see similar authors, read author blogs and more
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonCustomers say
Customers find the book has plenty of information and well-written explanations and examples. They also say it's highly readable with plenty of types and missing.
AI-generated from the text of customer reviews
Customers find the book has plenty of information.
"...It's very interesting to understand the kernel and windbg through this way...." Read more
"This book will teach you alot. Its not like lots of other books that waste space talking about useless information...." Read more
"Extremely well written and full of fantastic insight into deep workings of software...." Read more
"...intensive, you might come to the conclusion (as I did) that its not worth the effort since there is literally no way to to check your work for the..." Read more
Customers find the writing style well-written, deep, and dense. They also say every sentence is important and rationally laid out. Readers also mention that the book provides a great assessment of proper approach to the subject and is easy to follow like a good thriller.
"...I suggest the readers should do the exercises. The authors are very responsive and we can also find the answers/discussion on the internet...." Read more
"Rationally laid out. Worth a read. Nothing too technical inside, but gives a great assessment of proper approach to the subject." Read more
"Extremely well written and full of fantastic insight into deep workings of software...." Read more
"...Every sentence is important.You need to have used IDA and windbg before you start reading this book...." Read more
Reviews with images
-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
I do kernel and windbg very often (my daily work) so I started from these two chapters. It's very interesting to understand the kernel and windbg through this way. If you're not familiar with kernel and windbg, I suggest you read Windows Internals along with this book. Windows Internals tell you how the kernel works but without showing the code. With this book, you can actually use windbg to know how it works (dump or live debugging). This is very important for engineers because we need something to play with.
There are a lot of exercises in this book. I suggest the readers should do the exercises. The authors are very responsive and we can also find the answers/discussion on the internet. The authors also answer the questions on reddit. If you have hard time working on the exercises you can always send the mail to the authors.
Reviewed in the United States on June 8, 2023
This book is fairly small for a technical book at only 340 pages, but it is very dense. Every sentence is important.
You need to have used IDA and windbg before you start reading this book.
Very helpful to translate your knowledge from x86 to ARM and explaining how Windows kernel code works. I really like it's line "If the process of reverse engineering Windows drivers could be modeled as a discrete task, 90% would be understanding how Windows works and 10% would be understanding assembly code."
to a medium of communication, learning, entertainment and modern day commerce, this book although as admitted by the author is a primer
along side the recommended reading materials to afford one a grasp into an area that affects us all! and the best part, is that this work is easy to
follow like a good thriller, one finds oneself reading it again and again!!!
as soon as the financial enlightenment is realized, the suggest follow up reading material (s) will receive a warm
embrace!!!
Chapter 3: The Windows Kernel is my favorite chapter so far. If you're trying to learn more about the kernel from a security prospective, this is what you must read. I wasn't looking for a reverse engineering guide on it, instead fundamentals and concepts with a security perspective, but instead I got both. There's nothing else out there like this book.
Highly Recommended!
Top reviews from other countries
日本での唯一のレビューを書かれた方は業界のプロの方らしいのでワザととぼけて書いているのかも知れませんが、Windowsの内部というのはカーネルのことでこの手の本の題材として良く取り上げられているものですが、カーネルの中に存在するものをディスアセンブルした例が載っている本はほとんどないのでこの本の書名の題材に関心があれば充分有益な本だと思います。
また知ってのとおり?(Windowsの)カーネルに使えるデバッガというと(正しくはいくらか補足が必要なようですが)WinDbgになってしまうので(他の本で名前だけは見たことがあるSoftICEが遠い過去のものになってしまっているという意味で)WinDdgの存在価値は大きいのではないかと思います。
どうも日本ではr**tk*tについては検閲が存在していて、r**tk*tは存在しないことにされているようなので、日本で唯一のレビューを書かれた方はあのように書かれたのかも知れないとも思ったのですが、reverse engineeringというのはデバッグやmalware解析以外にゲームの解析という目的もあることを思い出したので、もしかしたらそっち方面の方かも知れません。













