- Paperback: 624 pages
- Publisher: Wiley; 1 edition (April 15, 2005)
- Language: English
- ISBN-10: 0764574817
- ISBN-13: 978-0764574818
- Product Dimensions: 7.4 x 1.4 x 9.2 inches
- Shipping Weight: 1.9 pounds (View shipping rates and policies)
- Average Customer Review: 44 customer reviews
- Amazon Best Sellers Rank: #86,961 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Reversing: Secrets of Reverse Engineering 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
Fulfillment by Amazon (FBA) is a service we offer sellers that lets them store their products in Amazon's fulfillment centers, and we directly pack, ship, and provide customer service for these products. Something we hope you'll especially enjoy: FBA items qualify for FREE Shipping and Amazon Prime.
If you're a seller, Fulfillment by Amazon can help you increase your sales. We invite you to learn more about Fulfillment by Amazon .
Frequently bought together
Customers who bought this item also bought
From the Back Cover
Sometimes, the best way to advance is in reverse
If you want to know how something works, you take it apart very carefully. That's exactly what this book shows youhow to deconstruct software in a way that reveals design and implementation details, sometimes even source code. Why? Because reversing reveals weak spots, so you can target your security efforts. Because you can reverse- engineer malicious code in order to neutralize it. Because understanding what makes a program work lets you build a better one. You'll learn how here.
- Learn to read compiler-generated assembly language code for IA-32 compatible processors
- Decipher an undocumented file format or network protocol
- Understand when reverse engineering is legal, and when and whyit may not be
- See how hackers use reversing to defeat copy protection technology
- Find out how to pull the plug on malicious code
- Determine how to prevent others from reversing your code, and find out how effective such steps can be
- Explore reverse engineering on the .NET platform and its assembly language, MSIL
- Observe the dissection of a real-world malicious program and see how the attacker used it to control infected systems
Companion Web siteVisit www.wiley.com/go/eeilam for a complete list of the sample programs in the book and links to valuable papers and products.
About the Author
Eldad Eilam is a consultant in the field of reverse engineering. He assists clients with operating system and in-depth software reverse engineering, and has devoted several years to developing advanced reverse engineering techniques.
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
This text will please even the moderately advanced programmer, although the first quarter or so might seem like too much review for the Windows C++ programmer. The .NET programmer will really benefit, though, since the focus through the Windows layers and into machine code will reveal a lot to the high-level person who hasn't yet had a chance to delve into 'internals.'
I think the book serves as a "pro" book for someone with C++/Windows experience by tying things together and moving to its reversing core while at the same time serving as an "intermediate" book, ironically, for the high-level programmer who will read it more for a qualitative comprehension and have to go out and read more 'internals' books (like Jeff Richter's books) if interested in deeper understanding.
My work invloves using some software for modeling transportation systems but most of the time the details of the underlying models that software relies on are not well documented. The information in this book helps me quickly learn how to reverse and get the information I want to know. Besides this book is very well written thus very enjoyable to read. In this regard, I would like to say - as an extra bonus I learned a lot from the author's writing ! (Sure, English is not my native lanuage but I have to write a lot technical reports in English for my daily work)
I love this book. Highly recommended!
I picked up this book to get better at exploiting software, and was not disappointed. However, this is not a book about exploit development. If anything, it is a book about software cracking, complete with a 50 page walkthrough of an intermediate level protection scheme. The chapter on finding security vulnerabilities is actually very weak, as is the chapter on malware analysis. Despite this, I was not disappointed because the fundamental reversing skills acquired by working through this book are also invaluable base skills for exploit development.
My main gripe with this book is it's sole focus on the Windows x86 evironment. I would expect a hypothetical second edition to include many pages on reversing x86-64 code, as well as a chapter on Android and iOS reversing.
Starts building a solid foundation about how source C code is translated into machine code step-by-step and it goes beyond up to the deep analysis of the data structures used throught the examples.
Without doubt, I recommend this one!
Most recent customer reviews
This was purchased for a friend so I assume the content was if quality for the subject because it was specifically requested by him.