- Paperback: 624 pages
- Publisher: Wiley; 1 edition (April 15, 2005)
- Language: English
- ISBN-10: 0764574817
- ISBN-13: 978-0764574818
- Product Dimensions: 7.3 x 1.5 x 9.2 inches
- Shipping Weight: 1.9 pounds (View shipping rates and policies)
- Average Customer Review: 42 customer reviews
- Amazon Best Sellers Rank: #62,760 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Reversing: Secrets of Reverse Engineering 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
Frequently bought together
Customers who bought this item also bought
From the Back Cover
Sometimes, the best way to advance is in reverse
If you want to know how something works, you take it apart very carefully. That's exactly what this book shows youhow to deconstruct software in a way that reveals design and implementation details, sometimes even source code. Why? Because reversing reveals weak spots, so you can target your security efforts. Because you can reverse-engineer malicious code in order to neutralize it. Because understanding what makes a program work lets you build a better one. You'll learn how here.
- Learn to read compiler-generated assembly language code for IA-32 compatible processors
- Decipher an undocumented file format or network protocol
- Understand when reverse engineering is legal, and whenand whyit may not be
- See how hackers use reversing to defeat copy protection technology
- Find out how to pull the plug on malicious code
- Determine how to prevent others from reversing your code, and find out how effective such steps can be
- Explore reverse engineering on the .NET platform and its assembly language, MSIL
- Observe the dissection of a real-world malicious program and see how the attacker used it to control infected systems
About the Author
Eldad Eilam is a consultant in the field of reverse engineering. He assists clients with operating system and in-depth software reverse engineering, and has devoted several years to developing advanced reverse engineering techniques.
Browse award-winning titles. See more
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
Starts building a solid foundation about how source C code is translated into machine code step-by-step and it goes beyond up to the deep analysis of the data structures used throught the examples.
Without doubt, I recommend this one!
I picked up this book to get better at exploiting software, and was not disappointed. However, this is not a book about exploit development. If anything, it is a book about software cracking, complete with a 50 page walkthrough of an intermediate level protection scheme. The chapter on finding security vulnerabilities is actually very weak, as is the chapter on malware analysis. Despite this, I was not disappointed because the fundamental reversing skills acquired by working through this book are also invaluable base skills for exploit development.
My main gripe with this book is it's sole focus on the Windows x86 evironment. I would expect a hypothetical second edition to include many pages on reversing x86-64 code, as well as a chapter on Android and iOS reversing.
The thing I love the most of the book what working with many examples with the author. He will slowly go through assembly code and try to figure out what it does. You don't wonder how he got there because he is very detailed explaining just how.
I myself have already being able to play around with many program and I have to say the rush you get when simple assembly instructions start to make sense is addicting.
If you have a Mac computer I recommend in investing on the Hopper disassembler as it has a pseudo code generator so you can compare what you think it does to what it actually does.