Tuesday, February 25, 2020

Reverse Engineering Secrets books

First Book


Reverse Engineering for Beginners

Abridged contents

I Codepatterns 1

II Importantfundamentals 430

III Slightlymoreadvancedexamples 439

IV Java 586

V Findingimportant/interestingstuffinthecode 624

VI OS-specific 647

VII Tools 701

VIII Examplesofreal-worldRE 3
tasks 707

IX Examplesofreversingproprietaryfileformats 821

X Otherthings 852

XI Books/blogsworthreading 870






Second



Mastering Reverse Engineering 

Re-engineer your ethical hacking skills ..........
Who this book?
If you are a security engineer, analyst, or system programmer and want to use reverse engineering to improve your software and hardware, this is the book for you. You will also find this book useful if you are a developer who wants to explore and learn reverse engineering. 
Chapters
 Preparing to Reverse
 Identification and Extraction of Hidden Components Technical requirements
 The Low-Level Language Technical requirements
 Static and Dynamic Reversing 103 Assessment and static analysis
 Tools of the Trade
 RE in Linux Platforms Setup
 RE for Windows Platforms Technical requirements
 Sandboxing - Virtualization as a Component for RE Emulation
 Binary Obfuscation Techniques Data assembly on the stack
 Packing and Encryption A quick review on how native executables are loaded by the OS Packers, crypters, obfuscators, protectors and SFX 
 Anti-analysis Tricks
 Practical Reverse Engineering of a Windows Executable Things to prepare
 Reversing Various File Types



Third 

 Secrets of Reverse Engineering

Part I Reversing 101
Chapters
Foundations
Low-Level Software 
Windows Fundamental
Reversing Tools (Free DOwnload)

Part II Applied Reversing
Chapters
Beyond the Documentation 
Deciphering File Formats 
Auditing Program Binaries 
Reversing Malware 

Part III Cracking
Chapters
Piracy and Copy Protection 
Antireversing Techniques 
Breaking Protections 

Part IV Beyond Disassembly
Chapters
Reversing .NET
Decompilation 

Appendix A Deciphering Code Structures
Appendix B Understanding Compiled Arithmetic
Appendix C Deciphering Program Data  





0 comments:

Post a Comment

Hack Me Tech