Reverse Engineering Code with IDA Pro

1st Edition

Authors: IOActive
Paperback ISBN: 9781597492379
eBook ISBN: 9780080558790
Imprint: Syngress
Published Date: 12th March 2008
Page Count: 328
Tax/VAT will be calculated at check-out
53.95
40.95
32.99
53.95
Unavailable
Compatible Not compatible
VitalSource PC, Mac, iPhone & iPad Amazon Kindle eReader
ePub & PDF Apple & PC desktop. Mobile devices (Apple & Android) Amazon Kindle eReader
Mobi Amazon Kindle eReader Anything else

Institutional Access


Description

If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pro’s interactive interface and programmable development language provide you with complete control over code disassembly and debugging. This is the only book which focuses exclusively on the world’s most powerful and popular took for reverse engineering code.

Key Features

Reverse Engineer REAL Hostile Code
To follow along with this chapter, you must download a file called !DANGER!INFECTEDMALWARE!DANGER!... ‘nuff said.
Portable Executable (PE) and Executable and Linking Formats (ELF)
Understand the physical layout of PE and ELF files, and analyze the components that are essential to reverse engineering.
Break Hostile Code Armor and Write your own Exploits
Understand execution flow, trace functions, recover hard coded passwords, find vulnerable functions, backtrace execution, and craft a buffer overflow.
Master Debugging
Debug in IDA Pro, use a debugger while reverse engineering, perform heap and stack access modification, and use other debuggers.
Stop Anti-Reversing
Anti-reversing, like reverse engineering or coding in assembly, is an art form. The trick of course is to try to stop the person reversing the application. Find out how!
Track a Protocol through a Binary and Recover its Message Structure
Trace execution flow from a read event, determine the structure of a protocol, determine if the protocol has any undocumented messages, and use IDA Pro to determine the functions that process a particular message.
*Develop IDA Scripts and Plug-ins
Learn the basics of IDA scripting and syntax, and write IDC scripts and plug-ins to automate even the most complex tasks.

Readership

Software and Web application developers, penetration testers, security auditors, and security researchers. Software developers can use it to identify bugs in their own software.

Table of Contents

Chapter 1: Introduction Chapter 2: Assembly and Reverse Engineering Basics Chapter 3: Portable Executable and Executable and Linking Formats Chapter 4: Walkthroughs One and Two Chapter 5: Debugging Chapter 6: Anti-Reversing Chapter 7: Walkthrough Four Chapter 8: Advanced Walkthrough Chapter 9: IDA Scripting and Plug-ins Index

Details

No. of pages:
328
Language:
English
Copyright:
© Syngress 2008
Published:
Imprint:
Syngress
eBook ISBN:
9780080558790
Paperback ISBN:
9781597492379

About the Author