
x86 Software Reverse-Engineering, Cracking, and Counter-Measures
- English
- ePUB (mobile friendly)
- Available on iOS & Android
x86 Software Reverse-Engineering, Cracking, and Counter-Measures
About this book
A crystal-clear and practical blueprint to software disassembly
x86 Software Reverse-Engineering, Cracking, and Counter-Measures is centered around the world of disassembling software. It will start with the basics of the x86 assembly language, and progress to how that knowledge empowers you to reverse-engineer and circumvent software protections. No knowledge of assembly, reverse engineering, or software cracking is required.
The book begins with a bootcamp on x86, learning how to read, write, and build in the assembly that powers a massive amount of the world's computers. Then the book will shift to reverse engineering applications using a handful of industry favorites such as IDA, Ghidra, Olly, and more. Next, we move to cracking with techniques such as patching and key generation, all harnessing the power of assembly and reverse engineering. Lastly, we'll examine cracking from a defensive perspective. Providing learners with techniques to be a better defender of their own software, or knowledge to crack these techniques more effectively.
- Assembly: computer Architecture, x86, system calls, building and linking, ASCII, condition codes, GDB, control flow, stack, calling conventions
- Reverse Engineering: reconnaissance, strings, RE strategy, stripping, linking, optimizations, compilers, industry tools
- Cracking: patching, key checkers, key generators, resource hacking, dependency walking
- Defense: anti-debugging, anti-tamper, packing, cryptors/decryptors, whitelist, blacklist, RASP, code signing, obfuscation
A practical and hands-on resource for security professionals to hobbyists, this book is for anyone who wants to learn to take apart, understand, and modify black-box software. x86 Software Reverse-Engineering, Cracking, and Counter-Measures is a vital resource for security researchers, reverse engineers and defenders who analyze, research, crack or defend software applications.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Table of Contents
- Title Page
- Introduction
- Chapter 1: Decompilation and Architecture
- Chapter 2: x86 Assembly: Data, Modes, Registers, and Memory Access
- Chapter 3: x86 Assembly: Instructions
- Chapter 4: Building and Running Assembly Programs
- Chapter 5: Understanding Condition Codes
- Chapter 6: Analyzing and Debugging Assembly Code
- Chapter 7: Functions and Control Flow
- Chapter 8: Compilers and Optimizers
- Chapter 9: Reverse Engineering: Tools and Strategies
- Chapter 10: Cracking: Tools and Strategies
- Chapter 11: Patching and Advanced Tooling
- Chapter 12: Defense
- Chapter 13: Advanced Defensive Techniques
- Chapter 14: Detection and Prevention
- Chapter 15: Legal
- Chapter 16: Advanced Techniques
- Chapter 17: Bonus Topics
- Conclusion
- Index
- Copyright
- About the Authors
- About the Technical Writer
- About the Technical Editor
- End User License Agreement