Text shows how to analyze programs without its source code, using a debugger and a disassembler. Covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and mathematical operators. For intermediate to advanced level programmers.
Hacker disassembling uncovered
β Scribed by Kris Kaspersky
- Publisher
- A-List Publishing
- Year
- 2003
- Tongue
- English
- Leaves
- 416
- Edition
- illustrated edition
- Category
- Library
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
I read the 2nd edition of this book, so I will be referring to it. First of all, let me tell you that is a VERY GOOD introduction to Reverse Engineering. If you are a beginner, you will get tons of useful and updated information from this book. For sure you will learn, and let me tell you that the
Explaining security vulnerabilities,Β possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitationΒ describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniquesβincluding BIOS rootkit