Picture 1 of 1
Picture 1 of 1
Practical Reverse Engineering: X86, X64, Arm, Windows Kernel, Reversing Tools,
US $30.34
Approximately£23.78
Condition:
Postage:
Located in: Sparks, Nevada, United States
Delivery:
Estimated between Mon, 10 Jun and Fri, 14 Jun to 43230
Returns:
Payments:
Shop with confidence
Seller assumes all responsibility for this listing.
eBay item number:285032298278
Item specifics
- Condition
- Book Title
- Practical Reverse Engineering: X86, X64, Arm, Windows Kernel, Rev
- Publication Date
- 2014-02-17
- Pages
- 384
- ISBN
- 1118787315
- Subject Area
- Computers, Technology & Engineering
- Publication Name
- Practical Reverse Engineering : X86, X64, Arm, Windows Kernel, Reversing Tools, and Obfuscation
- Item Length
- 9.2 in
- Publisher
- Wiley & Sons, Incorporated, John
- Subject
- Engineering (General), Security / General, Security / Networking
- Publication Year
- 2014
- Type
- Textbook
- Format
- Trade Paperback
- Language
- English
- Item Height
- 0.8 in
- Item Width
- 7.4 in
- Item Weight
- 18.4 Oz
- Number of Pages
- 384 Pages
About this product
Product Information
LEARN THE SCIENCE AND CRAFT OF REVERSE ENGINEERING TO FIGHT HACKERS AND ROOTKITS Criminals increasingly are using malicious software (exploits, viruses, rootkits, etc.) for fraud, denial-of-service, intrusions, and espionage operations. Reverse engineering is the only method to thoroughly dissect and understand such software. So it is no surprise that reverse engineering is one of the most important subjects in information security. Unfortunately, it is often perceived as a mysterious and complex black art. Although reverse engineering is a difficult subject, the authors believe there is a scientific approach to it. Practical Reverse Engineering aims to demystify the art and systematize the reverse-engineering process for students and professionals. Discover a unique, systematic approach to reverse engineering that incorporates hands-on analysis with real-world malware Find detailed coverage of the three most popular processor architectures: x86, x64, and ARM Use this concise, structured treatment of the Windows kernel and kernel-mode drivers, featuring walk-throughs and exercises with real-world rootkits Learn sophisticated code-obfuscation techniques, such as those used in virtual machine protections, and how to deobfuscate them using program-analysis techniques Discover advanced debugging techniques to automate and streamline the reverse-engineering process Apply newly learned concepts with complete walk-throughs and exercises using real-world malware
Product Identifiers
Publisher
Wiley & Sons, Incorporated, John
ISBN-10
1118787315
ISBN-13
9781118787311
eBay Product ID (ePID)
168542258
Product Key Features
Publication Name
Practical Reverse Engineering : X86, X64, Arm, Windows Kernel, Reversing Tools, and Obfuscation
Format
Trade Paperback
Language
English
Subject
Engineering (General), Security / General, Security / Networking
Publication Year
2014
Type
Textbook
Subject Area
Computers, Technology & Engineering
Number of Pages
384 Pages
Dimensions
Item Length
9.2 in
Item Height
0.8 in
Item Width
7.4 in
Item Weight
18.4 Oz
Additional Product Features
LCCN
2013-954099
Intended Audience
Trade
Lc Classification Number
Qa76.9.A25
Table of Content
Introduction xxiii Chapter 1 x86 and x64 1 Register Set and Data Types 2 Instruction Set 3 Syntax 4 Data Movement 5 Exercise 11 Arithmetic Operations 11 Stack Operations and Function Invocation 13 Exercises 17 Control Flow 17 System Mechanism 25 Address Translation 26 Interrupts and Exceptions 27 Walk-Through 28 Exercises 35 x64 36 Register Set and Data Types 36 Data Movement 36 Canonical Address 37 Function Invocation 37 Exercises 38 Chapter 2 ARM 39 Basic Features 40 Data Types and Registers 43 System-Level Controls and Settings 45 Introduction to the Instruction Set 46 Loading and Storing Data 47 LDR and STR 47 Other Usage for LDR 51 LDM and STM 52 PUSH and POP 56 Functions and Function Invocation 57 Arithmetic Operations 60 Branching and Conditional Execution 61 Thumb State 64 Switch-Case 65 Miscellaneous 67 Just-in-Time and Self-Modifying Code 67 Synchronization Primitives 67 System Services and Mechanisms 68 Instructions 70 Walk-Through 71 Next Steps 77 Exercises 78 Chapter 3 The Windows Kernel 87 Windows Fundamentals 88 Memory Layout 88 Processor Initialization 89 System Calls 92 Interrupt Request Level 104 Pool Memory 106 Memory Descriptor Lists 106 Processes and Threads 107 Execution Context 109 Kernel Synchronization Primitives 110 Lists 111 Implementation Details 112 Walk-Through 119 Exercises 123 Asynchronous and Ad-Hoc Execution 128 System Threads 128 Work Items 129 Asynchronous Procedure Calls 131 Deferred Procedure Calls 135 Timers 140 Process and Thread Callbacks 142 Completion Routines 143 I/O Request Packets 144 Structure of a Driver 146 Entry Points 147 Driver and Device Objects 149 IRP Handling 150 A Common Mechanism for User-Kernel Communication 150 Miscellaneous System Mechanisms 153 Walk-Throughs 155 An x86 Rootkit 156 An x64 Rootkit 172 Next Steps 178 Exercises 180 Building Confidence and Solidifying Your Knowledge 180 Investigating and Extending Your Knowledge 182 Analysis of Real-Life Drivers 184 Chapter 4 Debugging and Automation 187 The Debugging Tools and Basic Commands 188 Setting the Symbol Path 189 Debugger Windows 189 Evaluating Expressions 190 Process Control and Debut Events 194 Registers, Memory, and Symbols 198 Breakpoints 208 Inspecting Processes and Modules 211 Miscellaneous Commands 214 Scripting with the Debugging Tools 216 Pseudo-Registers 216 Aliases 219 Language 226 Script Files 240 Using Scripts Like Functions 244 Example Debug Scripts 249 Using the SDK 257 Concepts 258 Writing Debugging Tools Extensions 262 Useful Extensions, Tools, and Resources 264 Chapter 5 Obfuscation 267 A Survey of Obfuscation Techniques 269 The Nature of Obfuscation: A Motivating Example 269 Data-Based Obfuscations 273 Control-Based Obfuscation 278 Simultaneous Control-Flow and Data-Flow Obfuscation 284 Achieving Security by Obscurity 288 A Survey of Deobfuscation Techniques 289 The Nature of Deobfuscation: Transformation Inversion 289 Deobfuscation Tools 295 Practical Deobfuscation 312 Case Study 328 First Impressions 328 Analyzing Handlers Semantics 330 Symbolic Execution 333 Solving the Challenge 334 Final Thoughts 336 Exercises 336 Appendix Sample Names and Corresponding SHA1 Hashes 341 Index 343
Copyright Date
2014
Dewey Decimal
005.8
Dewey Edition
23
Illustrated
Yes
Item description from the seller
Business seller information
Alibris, Inc.
Rob Lambert
2560 9th St
Ste 215
94710-2565 Berkeley, CA
United States
I certify that all my selling activities will comply with all EU laws and regulations.
Seller assumes all responsibility for this listing.
eBay item number:285032298278
Post to me
Item location:
Sparks, Nevada, United States
Posts to:
Albania, Andorra, Angola, Anguilla, Antigua and Barbuda, Argentina, Armenia, Aruba, Australia, Austria, Azerbaijan Republic, Bahamas, Bahrain, Bangladesh, Belgium, Belize, Benin, Bermuda, Bhutan, Bolivia, Bosnia and Herzegovina, Botswana, Brunei Darussalam, Bulgaria, Burkina Faso, Burundi, Cambodia, Cameroon, Canada, Cape Verde Islands, Cayman Islands, Central African Republic, Chad, Chile, China, Colombia, Costa Rica, Cyprus, Czech Republic, Côte d'Ivoire (Ivory Coast), Democratic Republic of the Congo, Denmark, Djibouti, Dominican Republic, Ecuador, Egypt, El Salvador, Equatorial Guinea, Eritrea, Estonia, Ethiopia, Fiji, Finland, France, Gabon Republic, Gambia, Georgia, Ghana, Gibraltar, Greece, Greenland, Grenada, Guatemala, Guinea, Guyana, Haiti, Honduras, Hong Kong, Hungary, Iceland, India, Indonesia, Ireland, Israel, Italy, Jamaica, Japan, Jordan, Kazakhstan, Kenya, Kiribati, Kuwait, Kyrgyzstan, Laos, Latvia, Lebanon, Lesotho, Liechtenstein, Lithuania, Luxembourg, Macau, Macedonia, Madagascar, Malawi, Malaysia, Maldives, Mali, Malta, Mauritania, Mauritius, Mexico, Moldova, Monaco, Mongolia, Montenegro, Montserrat, Morocco, Mozambique, Namibia, Nauru, Nepal, Netherlands, New Zealand, Nicaragua, Niger, Norway, Oman, Pakistan, Panama, Papua New Guinea, Paraguay, Peru, Philippines, Poland, Portugal, Qatar, Republic of Croatia, Republic of the Congo, Romania, Rwanda, Saint Kitts-Nevis, Saint Lucia, Saint Vincent and the Grenadines, San Marino, Saudi Arabia, Senegal, Serbia, Seychelles, Sierra Leone, Singapore, Slovakia, Slovenia, Solomon Islands, South Africa, South Korea, Spain, Sri Lanka, Suriname, Swaziland, Sweden, Switzerland, Taiwan, Tajikistan, Tanzania, Thailand, Togo, Tonga, Trinidad and Tobago, Tunisia, Turkey, Turkmenistan, Turks and Caicos Islands, Uganda, United Arab Emirates, United Kingdom, United States, Uruguay, Uzbekistan, Vanuatu, Vatican City State, Vietnam, Wallis and Futuna, Western Samoa, Yemen, Zambia, Zimbabwe
Excludes:
APO/FPO, Afghanistan, Alaska/Hawaii, Algeria, Barbados, Belarus, Brazil, French Guiana, French Polynesia, Guadeloupe, Guinea-Bissau, Iraq, Liberia, Libya, Martinique, New Caledonia, Nigeria, Reunion, Russian Federation, US Protectorates, Ukraine, Venezuela
Postage and packaging | To | Service | Delivery*See Delivery notes |
---|---|---|---|
Free postage | United States | Standard Shipping | Estimated between Mon, 10 Jun and Fri, 14 Jun to 43230 |
US $5.50 (approx £4.31) | United States | Expedited Shipping | Estimated between Tue, 11 Jun and Sat, 15 Jun to 43230 |
Dispatch time |
---|
Will usually dispatch within 2 working days of receiving cleared payment. |
Taxes |
---|
Seller charges sales tax in |
Returns policy
After receiving the item, cancel the purchase within | Refund will be given as | Return postage |
---|---|---|
30 days | Money back | Buyer pays for return postage |
Refer to eBay return policyopens in a new tab or window for more details. You're covered by the eBay Money Back Guaranteeopens in a new tab or window if you receive an item that is not as described in the listing.
The buyer is responsible for return postage costs.
Return policy details |
---|
Returns accepted |
Most purchases from business sellers are protected by the Consumer Contract Regulations 2013 which give you the right to cancel the purchase within 14 days after the day you receive the item. Find out more about your rights as a buyer and exceptions.
Payment details
Payment methods
Registered as a business seller
Seller Feedback (461,411)
e***l (96)- Feedback left by buyer.
Past 6 months
Verified purchase
Super impressed with this seller! They had the best price by far for this book! Both the cost of the book and the shipping fee was far better than average! The book came exactly as described, it was well packaged and quite a bit earlier than expected! The seller was polite and replied quickly to my messages.
I’ll definitely make another purchase soon!
Thank you to the seller! Be safe and keep up the great work!
l***w (85)- Feedback left by buyer.
Past 6 months
Verified purchase
WONDERFUL book! Better than described, in just like new condition [not just good]. Packaged very carefully, shipped very securely. Great seller, would buy from again in a heartbeat! No communication occurred, but I imagine it would have been as good as the rest of their customer service. Very happy with purchase, thank you very much!
t***1 (89)- Feedback left by buyer.
Past month
Verified purchase
Excellent packaging, expedited shipping, great seller communication, and accurate photo representation. I'm very pleased to have received this graphic novel for a fair and competitive price. Brand new and sealed!! I would highly recommend and purchase from this reputable retailer again. Thank you 👍!
Product ratings and reviews
More to explore:
- Practical Television Magazines,
- Practical Motorist Magazines,
- Practical Electronics Magazines,
- Practical Woodworking Magazines,
- Practical Wireless Magazines,
- Practical Motorist Monthly Magazines,
- School Revision/Practice in English,
- Practical Television Magazines in English,
- Practical Boat Owner Magazines,
- Practical Motorist Magazines in English