The IDA Pro Book, 2nd Edition

The Unofficial Guide to the World's Most Popular Disassembler

Author: Chris Eagle

Publisher: No Starch Press

ISBN: 1593272898

Category: Computers

Page: 672

View: 8951

"The IDA Pro Book" provides a comprehensive, top-down overview of IDA Pro and its use for reverse engineering software. This edition has been updated to cover the new features and cross-platform interface of IDA Pro 6.0.
Release

Reversing

Secrets of Reverse Engineering

Author: Eldad Eilam

Publisher: John Wiley & Sons

ISBN: 1118079760

Category: Computers

Page: 624

View: 666

Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language
Release

Reverse Engineering Code with IDA Pro

Author: IOActive

Publisher: Elsevier

ISBN: 0080558798

Category: Computers

Page: 328

View: 9476

If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pro’s interactive interface and programmable development language provide you with complete control over code disassembly and debugging. This is the only book which focuses exclusively on the world’s most powerful and popular took for reverse engineering code. *Reverse Engineer REAL Hostile Code To follow along with this chapter, you must download a file called !DANGER!INFECTEDMALWARE!DANGER!... ‘nuff said. *Portable Executable (PE) and Executable and Linking Formats (ELF) Understand the physical layout of PE and ELF files, and analyze the components that are essential to reverse engineering. *Break Hostile Code Armor and Write your own Exploits Understand execution flow, trace functions, recover hard coded passwords, find vulnerable functions, backtrace execution, and craft a buffer overflow. *Master Debugging Debug in IDA Pro, use a debugger while reverse engineering, perform heap and stack access modification, and use other debuggers. *Stop Anti-Reversing Anti-reversing, like reverse engineering or coding in assembly, is an art form. The trick of course is to try to stop the person reversing the application. Find out how! *Track a Protocol through a Binary and Recover its Message Structure Trace execution flow from a read event, determine the structure of a protocol, determine if the protocol has any undocumented messages, and use IDA Pro to determine the functions that process a particular message. *Develop IDA Scripts and Plug-ins Learn the basics of IDA scripting and syntax, and write IDC scripts and plug-ins to automate even the most complex tasks.
Release

Practical Reverse Engineering

x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

Author: Bruce Dang,Alexandre Gazet,Elias Bachaalany

Publisher: John Wiley & Sons

ISBN: 1118787390

Category: Computers

Page: 384

View: 5480

Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their tracks. The book covers x86, x64, and ARM (the first book to cover all three); Windows kernel-mode code rootkits and drivers; virtual machine protection techniques; and much more. Best of all, it offers a systematic approach to the material, with plenty of hands-on exercises and real-world examples. Offers a systematic approach to understanding reverse engineering, with hands-on exercises and real-world examples Covers x86, x64, and advanced RISC machine (ARM) architectures as well as deobfuscation and virtual machine protection techniques Provides special coverage of Windows kernel-mode code (rootkits/drivers), a topic not often covered elsewhere, and explains how to analyze drivers step by step Demystifies topics that have a steep learning curve Includes a bonus chapter on reverse engineering tools Practical Reverse Engineering: Using x86, x64, ARM, Windows Kernel, and Reversing Tools provides crucial, up-to-date guidance for a broad range of IT professionals.
Release

Practical Malware Analysis

The Hands-On Guide to Dissecting Malicious Software

Author: Michael Sikorski,Andrew Honig

Publisher: No Starch Press

ISBN: 1593272901

Category: Computers

Page: 800

View: 9248

Introduces tools and techniques for analyzing and debugging malicious software, discussing how to set up a safe virtual environment, overcome malware tricks, and use five of the most popular packers.
Release

Reverse Engineering

Technology of Reinvention

Author: Wego Wang

Publisher: CRC Press

ISBN: 9781439806319

Category: Technology & Engineering

Page: 357

View: 4748

The process of reverse engineering has proven infinitely useful for analyzing Original Equipment Manufacturer (OEM) components to duplicate or repair them, or simply improve on their design. A guidebook to the rapid-fire changes in this area, Reverse Engineering: Technology of Reinvention introduces the fundamental principles, advanced methodologies, and other essential aspects of reverse engineering. The book’s primary objective is twofold: to advance the technology of reinvention through reverse engineering and to improve the competitiveness of commercial parts in the aftermarket. Assembling and synergizing material from several different fields, this book prepares readers with the skills, knowledge, and abilities required to successfully apply reverse engineering in diverse fields ranging from aerospace, automotive, and medical device industries to academic research, accident investigation, and legal and forensic analyses. With this mission of preparation in mind, the author offers real-world examples to: Enrich readers’ understanding of reverse engineering processes, empowering them with alternative options regarding part production Explain the latest technologies, practices, specifications, and regulations in reverse engineering Enable readers to judge if a "duplicated or repaired" part will meet the design functionality of the OEM part This book sets itself apart by covering seven key subjects: geometric measurement, part evaluation, materials identification, manufacturing process verification, data analysis, system compatibility, and intelligent property protection. Helpful in making new, compatible products that are cheaper than others on the market, the author provides the tools to uncover or clarify features of commercial products that were either previously unknown, misunderstood, or not used in the most effective way.
Release

Practical Intrusion Analysis

Prevention and Detection for the Twenty-First Century

Author: Ryan Trost

Publisher: Pearson Education

ISBN: 9780321591883

Category: Computers

Page: 480

View: 7980

“Practical Intrusion Analysis provides a solid fundamental overview of the art and science of intrusion analysis.” –Nate Miller, Cofounder, Stratum Security The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments. However, security practitioners have found little reliable, usable information about these new IDS/IPS technologies. In Practical Intrusion Analysis, one of the field’s leading experts brings together these innovations for the first time and demonstrates how they can be used to analyze attacks, mitigate damage, and track attackers. Ryan Trost reviews the fundamental techniques and business drivers of intrusion detection and prevention by analyzing today’s new vulnerabilities and attack vectors. Next, he presents complete explanations of powerful new IDS/IPS methodologies based on Network Behavioral Analysis (NBA), data visualization, geospatial analysis, and more. Writing for security practitioners and managers at all experience levels, Trost introduces new solutions for virtually every environment. Coverage includes Assessing the strengths and limitations of mainstream monitoring tools and IDS technologies Using Attack Graphs to map paths of network vulnerability and becoming more proactive about preventing intrusions Analyzing network behavior to immediately detect polymorphic worms, zero-day exploits, and botnet DoS attacks Understanding the theory, advantages, and disadvantages of the latest Web Application Firewalls Implementing IDS/IPS systems that protect wireless data traffic Enhancing your intrusion detection efforts by converging with physical security defenses Identifying attackers’ “geographical fingerprints” and using that information to respond more effectively Visualizing data traffic to identify suspicious patterns more quickly Revisiting intrusion detection ROI in light of new threats, compliance risks, and technical alternatives Includes contributions from these leading network security experts: Jeff Forristal, a.k.a. Rain Forest Puppy, senior security professional and creator of libwhisker Seth Fogie, CEO, Airscanner USA; leading-edge mobile security researcher; coauthor of Security Warrior Dr. Sushil Jajodia, Director, Center for Secure Information Systems; founding Editor-in-Chief, Journal of Computer Security Dr. Steven Noel, Associate Director and Senior Research Scientist, Center for Secure Information Systems, George Mason University Alex Kirk, Member, Sourcefire Vulnerability Research Team
Release

The Art of Software Security Assessment

Identifying and Preventing Software Vulnerabilities

Author: Mark Dowd,John McDonald,Justin Schuh

Publisher: Pearson Education

ISBN: 0132701936

Category: Computers

Page: 1200

View: 6755

The Definitive Insider’s Guide to Auditing Software Security This is one of the most detailed, sophisticated, and useful guides to software security auditing ever written. The authors are leading security consultants and researchers who have personally uncovered vulnerabilities in applications ranging from sendmail to Microsoft Exchange, Check Point VPN to Internet Explorer. Drawing on their extraordinary experience, they introduce a start-to-finish methodology for “ripping apart” applications to reveal even the most subtle and well-hidden security flaws. The Art of Software Security Assessment covers the full spectrum of software vulnerabilities in both UNIX/Linux and Windows environments. It demonstrates how to audit security in applications of all sizes and functions, including network and Web software. Moreover, it teaches using extensive examples of real code drawn from past flaws in many of the industry's highest-profile applications. Coverage includes • Code auditing: theory, practice, proven methodologies, and secrets of the trade • Bridging the gap between secure software design and post-implementation review • Performing architectural assessment: design review, threat modeling, and operational review • Identifying vulnerabilities related to memory management, data types, and malformed data • UNIX/Linux assessment: privileges, files, and processes • Windows-specific issues, including objects and the filesystem • Auditing interprocess communication, synchronization, and state • Evaluating network software: IP stacks, firewalls, and common application protocols • Auditing Web applications and technologies
Release

GSM - Architecture, Protocols and Services

Author: Jörg Eberspächer,Hans-Joerg Vögel,Christian Bettstetter,Christian Hartmann

Publisher: John Wiley & Sons

ISBN: 9780470741726

Category: Technology & Engineering

Page: 338

View: 6401

With around 3 billion subscribers, GSM is the world's most commonly used technology for wireless communication. Providing an overview of the innovations that have fuelled this phenomena, GSM: Architecture, Protocols and Services, Third Edition offers a clear introduction to the field of cellular systems. Special emphasis is placed on system architecture and protocol aspects, and topics range from addressing concepts through mobility management to network management. This third edition contains around 25% new and reworked material and has been thoroughly updated to encompass recent advances and future trends. It serves as both an introductory textbook for graduate students as well as a reference resource for telecommunications engineers and researchers. This edition: Presents capacity enhancement methods like sectorization, the application of adaptive antennas for Spatial Filtering for Interference Reduction (SFIR) and Space Division Multiple Access (SDMA) Provides a detailed introduction to GPRS, HSCSD, and EDGE for packet-switched services and higher data rates Features updated coverage on the vastly expanded range of GSM services, including an examination of Multimedia Messaging Service (MMS) Adopts a highly graphical approach with numerous illustrations
Release

How Wikipedia Works

And how You Can be a Part of it

Author: Phoebe Ayers,Charles Matthews,Ben Yates

Publisher: No Starch Press

ISBN: 159327176X

Category: Computers

Page: 5036

View: 5661

Provides information on using and contributing to Wikipedia, covering such topics as evaluating the reliability of articles, editing existing articles, adding new articles, communiating with other users, and resolving content disputes.
Release

Web Security

A Step-by-step Reference Guide

Author: Lincoln D. Stein

Publisher: Addison-Wesley Professional

ISBN: 9780201634891

Category: Computers

Page: 436

View: 9735

A practical reference guide introduces a checklist approach that readers can use to evaluate the security level of a Web site and protect it from both hostile intruders and other malevolent Web sites. Original. (Intermediate).
Release

Android Security Internals

An In-Depth Guide to Android's Security Architecture

Author: Nikolay Elenkov

Publisher: No Starch Press

ISBN: 1593276419

Category: Computers

Page: 432

View: 813

There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals—until now. In Android Security Internals, top Android security expert Nikolay Elenkov takes us under the hood of the Android security sys­tem. Elenkov describes Android security archi­tecture from the bottom up, delving into the imple­mentation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic providers, and device administration. You’ll learn: –How Android permissions are declared, used, and enforced –How Android manages application packages and employs code signing to verify their authenticity –How Android implements the Java Cryptography Architecture (JCA) and Java Secure Socket Extension (JSSE) frameworks –About Android’s credential storage system and APIs, which let applications store cryptographic keys securely –About the online account management framework and how Google accounts integrate with Android –About the implementation of verified boot, disk encryption, lockscreen, and other device security features –How Android’s bootloader and recovery OS are used to perform full system updates, and how to obtain root access With its unprecedented level of depth and detail, Android Security Internals is a must-have for any security-minded Android developer.
Release

Broadband Wireless Multimedia Networks

Author: Benny Bing

Publisher: John Wiley & Sons

ISBN: 1118479785

Category: Technology & Engineering

Page: 376

View: 4580

Provides a clear, coherent review of all major wireless broadband standards with an emphasis on managing the explosive growth in mobile video 802.11ac/ad, 802.16m, 802.22, and LTE-Advanced are the emerging broadband wireless standards that offer many powerful wireless features. This book gives an accessible overview of the various standards and practical information on 802.11 link adaptation, 4G smartphone antenna design, wireless video streaming, and smart grids. Broadband Wireless Multimedia Networks distills the many complex wireless features in a clean and concise manner so that the reader can understand the key principles. Topics covered include adaptive modulation and coding, orthogonal frequency-division multiple access, single-carrier frequency-division multiple access, multiple antenna systems, medium access control time and frequency-division duplex, transmission, and the frame formats. With wireless operators now carrying a much greater amount of video traffic than data and voice traffic, the book also covers adaptive bit rate streaming and bandwidth management for 3D and HD video delivery to multi-screen personal devices. Featured chapters in the book are: Overview of Broadband Wireless Networks IEEE 802.11 Standard IEEE 802.16 Standard Long-Term Evolution ATSC Digital TV and IEEE 802.22 Standards Mesh, Relay, and Interworking Networks Wireless Video Streaming Green Communications in Wireless Home Area Networks Including over 180 chapter-end exercises and 200 illustrative figures; and accessible recorded tutorials, Broadband Wireless Multimedia Networks is ideal for industry professionals and practitioners, graduate students, and researchers.
Release

Disassembling Code

IDA Pro and SoftICE

Author: Vlad Pirogov

Publisher: A-List Publishing

ISBN: 9781931769518

Category: Computers

Page: 500

View: 1679

Provides information on software code analysis using tools such as IDA Pro and SoftICE.
Release

The Art of Assembly Language, 2nd Edition

Author: Randall Hyde

Publisher: No Starch Press

ISBN: 1593273010

Category: Computers

Page: 760

View: 8261

Assembly is a low-level programming language that's one step above a computer's native machine language. Although assembly language is commonly used for writing device drivers, emulators, and video games, many programmers find its somewhat unfriendly syntax intimidating to learn and use. Since 1996, Randall Hyde's The Art of Assembly Language has provided a comprehensive, plain-English, and patient introduction to 32-bit x86 assembly for non-assembly programmers. Hyde's primary teaching tool, High Level Assembler (or HLA), incorporates many of the features found in high-level languages (like C, C++, and Java) to help you quickly grasp basic assembly concepts. HLA lets you write true low-level code while enjoying the benefits of high-level language programming. As you read The Art of Assembly Language, you'll learn the low-level theory fundamental to computer science and turn that understanding into real, functional code. You'll learn how to: –Edit, compile, and run HLA programs –Declare and use constants, scalar variables, pointers, arrays, structures, unions, and namespaces –Translate arithmetic expressions (integer and floating point) –Convert high-level control structures This much anticipated second edition of The Art of Assembly Language has been updated to reflect recent changes to HLA and to support Linux, Mac OS X, and FreeBSD. Whether you're new to programming or you have experience with high-level languages, The Art of Assembly Language, 2nd Edition is your essential guide to learning this complex, low-level language.
Release

The Antivirus Hacker's Handbook

Author: Joxean Koret,Elias Bachaalany

Publisher: John Wiley & Sons

ISBN: 1119028760

Category: Computers

Page: 384

View: 5782

Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus' line of defense. You'll begin building your knowledge by diving into the reverse engineering process, which details how to start from a finished antivirus software program and work your way back through its development using the functions and other key elements of the software. Next, you leverage your new knowledge about software development to evade, attack, and exploit antivirus software—all of which can help you strengthen your network and protect your data. While not all viruses are damaging, understanding how to better protect your computer against them can help you maintain the integrity of your network. Discover how to reverse engineer your antivirus software Explore methods of antivirus software evasion Consider different ways to attack and exploit antivirus software Understand the current state of the antivirus software market, and get recommendations for users and vendors who are leveraging this software The Antivirus Hacker's Handbook is the essential reference for software reverse engineers, penetration testers, security researchers, exploit writers, antivirus vendors, and software engineers who want to understand how to leverage current antivirus software to improve future applications.
Release

Gray Hat Python

Python Programming for Hackers and Reverse Engineers

Author: Justin Seitz

Publisher: No Starch Press

ISBN: 1593272243

Category: Computers

Page: 216

View: 1656

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore. Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin Seitz goes beyond theory, showing you how to harness existing Python-based security tools—and how to build your own when the pre-built ones won't cut it. You'll learn how to: –Automate tedious reversing and security tasks –Design and program your own debugger –Learn how to fuzz Windows drivers and create powerful fuzzers from scratch –Have fun with code and library injection, soft and hard hooking techniques, and other software trickery –Sniff secure traffic out of an encrypted web browser session –Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and more The world's best hackers are using Python to do their handiwork. Shouldn't you?
Release

Security Warrior

Author: Cyrus Peikari,Anton Chuvakin

Publisher: "O'Reilly Media, Inc."

ISBN: 9780596517229

Category: Computers

Page: 552

View: 2006

When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle.Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability.Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.
Release

Ajax Bible

Author: Steve Holzner

Publisher: John Wiley & Sons

ISBN: 0470377518

Category: Computers

Page: 695

View: 7264

Build interactive Web applications with Ajax Create live searches and online spreadsheets Discover programming mistakes to avoid! Create blazing-fast Web applications with powerful Ajax If you think that mastering Ajax is too difficult, guess again. You can create Web applications that look and feel like desktop apps in less time than you think with the comprehensive Ajax instruction in this in-depth book. You'll find easy-to-follow tutorials, hundreds of tips and tricks, and so much practical information that even skilled developers will reach for this book first. Let this Bible be your guide as you jump into the hottest Web programming technology in years. * Master the fundamentals--JavaScript(r), XML, dynamic HTML, and CSS * Tie Ajax into Google with the Google(r) API * Handle simultaneous XMLHttpRequest objects in Ajax * Use Ajax frameworks such as Ruby on Rails, AjaxTags, and others * Understand the Document Object Model (DOM) * Create floating menus and effects with CSS * Encrypt data over plain HTTP using JavaScript * Adapt real-world examples to your own programs Companion Web site Find all the code used throughout the book at www.wiley.com/go/ajaxbible
Release