Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniquesโincluding BIOS rootkit
BIOS Disassembly Ninjutsu uncovered
โ Scribed by Darmawan Salihun
- Publisher
- A-List
- Year
- 2006
- Tongue
- English
- Leaves
- 577
- Category
- Library
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
Explaining security vulnerabilities,ย possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitationย describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniquesโincluding BIOS rootkit
Text shows how to analyze programs without its source code, using a debugger and a disassembler. Covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and mathematical operators. For intermediate to advanced level programmers.
I read the 2nd edition of this book, so I will be referring to it. First of all, let me tell you that is a VERY GOOD introduction to Reverse Engineering. If you are a beginner, you will get tons of useful and updated information from this book. For sure you will learn, and let me tell you that the