000 02709nam a2200229 4500
005 20250811144553.0
008 250806b2024|||||||| |||| 00| 0 eng d
020 _a9781394199907
041 _aEnglish
082 _a005.26
100 _aDomas, Stephanie
_eAuthor
_97467
100 _aDomas, Christopher
_eCo-Author
_97468
245 _ax86 software reverse-engineering, cracking, and counter-measures
260 _aNew Jersey:
_bWiley and Data Cybersecurity,
_c2024.
300 _axxix, 284p.
500 _aA crystal-clear and practical blueprint to software disassembly x86 Software Reverse-Engineering, Cracking, and Counter-Measures is centered around the world of disassembling software. It will start with the basics of the x86 assembly language, and progress to how that knowledge empowers you to reverse-engineer and circumvent software protections. No knowledge of assembly, reverse engineering, or software cracking is required. The book begins with a bootcamp on x86, learning how to read, write, and build in the assembly that powers a massive amount of the world’s computers. Then the book will shift to reverse engineering applications using a handful of industry favorites such as IDA, Ghidra, Olly, and more. Next, we move to cracking with techniques such as patching and key generation, all harnessing the power of assembly and reverse engineering. Lastly, we’ll examine cracking from a defensive perspective. Providing learners with techniques to be a better defender of their own software, or knowledge to crack these techniques more effectively. Assembly: computer Architecture, x86, system calls, building and linking, ASCII, condition codes, GDB, control flow, stack, calling conventions Reverse Engineering: reconnaissance, strings, RE strategy, stripping, linking, optimizations, compilers, industry tools Cracking: patching, key checkers, key generators, resource hacking, dependency walking Defense: anti-debugging, anti-tamper, packing, cryptors/decryptors, whitelist, blacklist, RASP, code signing, obfuscation A practical and hands-on resource for security professionals to hobbyists, this book is for anyone who wants to learn to take apart, understand, and modify black-box software. x86 Software Reverse-Engineering, Cracking, and Counter-Measures is a vital resource for security researchers, reverse engineers and defenders who analyze, research, crack or defend software applications.
650 _aData, Modes, Registers, and Memory Access
_97469
650 _aBuilding and Running Assembly Programs
_97470
650 _a Analyzing and Debugging Assembly Code
_97471
856 _uhttps://ieeexplore.ieee.org/servlet/opac?bknumber=10649669
942 _cEB
999 _c1839
_d1839