Amazon cover image
Image from Amazon.com

x86 software reverse-engineering, cracking, and counter-measures

By: Domas, Stephanie [Author] | Domas, Christopher [Co-Author]Material type: TextTextLanguage: English Publication details: New Jersey: Wiley and Data Cybersecurity, 2024. Description: xxix, 284pISBN: 9781394199907Subject(s): Data, Modes, Registers, and Memory Access | Building and Running Assembly Programs | Analyzing and Debugging Assembly CodeDDC classification: 005.26 Online resources: Click here to access online
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

A crystal-clear and practical blueprint to software disassembly

x86 Software Reverse-Engineering, Cracking, and Counter-Measures is centered around the world of disassembling software. It will start with the basics of the x86 assembly language, and progress to how that knowledge empowers you to reverse-engineer and circumvent software protections. No knowledge of assembly, reverse engineering, or software cracking is required.

The book begins with a bootcamp on x86, learning how to read, write, and build in the assembly that powers a massive amount of the world’s computers. Then the book will shift to reverse engineering applications using a handful of industry favorites such as IDA, Ghidra, Olly, and more. Next, we move to cracking with techniques such as patching and key generation, all harnessing the power of assembly and reverse engineering. Lastly, we’ll examine cracking from a defensive perspective. Providing learners with techniques to be a better defender of their own software, or knowledge to crack these techniques more effectively.

Assembly: computer Architecture, x86, system calls, building and linking, ASCII, condition codes, GDB, control flow, stack, calling conventions
Reverse Engineering: reconnaissance, strings, RE strategy, stripping, linking, optimizations, compilers, industry tools
Cracking: patching, key checkers, key generators, resource hacking, dependency walking
Defense: anti-debugging, anti-tamper, packing, cryptors/decryptors, whitelist, blacklist, RASP, code signing, obfuscation
A practical and hands-on resource for security professionals to hobbyists, this book is for anyone who wants to learn to take apart, understand, and modify black-box software. x86 Software Reverse-Engineering, Cracking, and Counter-Measures is a vital resource for security researchers, reverse engineers and defenders who analyze, research, crack or defend software applications.


Implemented and Maintained by Dr. S.R. Ranganathan Library.
For any Suggestions/Query Contact to library or Email: library@iipe.ac.in
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha