Domas, Stephanie,
x86 software reverse-engineering, cracking, and counter-measures / Stephanie Domas, Christopher Domas. - 1 online resource : illustrations (some color) - - Tech today. . - Tech today. .
Includes index.
"A crystal-clear and practical blueprint to software disassembly. x86 Software Reverse-Engineering, Cracking, and Counter-Measures is centered around the world of disassembling software. It will start with the basics of the x86 assembly language, and progress to how that knowledge empowers you to reverse-engineer and circumvent software protections. No knowledge of assembly, reverse engineering, or software cracking is required. The book begins with a bootcamp on x86, learning how to read, write, and build in the assembly that powers a massive amount of the world's computers. Then the book will shift to reverse engineering applications using a handful of industry favorites such as IDA, Ghidra, Olly, and more. Next, we move to cracking with techniques such as patching and key generation, all harnessing the power of assembly and reverse engineering. Lastly, we'll examine cracking from a defensive perspective. Providing learners with techniques to be a better defender of their own software, or knowledge to crack these techniques more effectively. A practical and hands-on resource for security professionals to hobbyists, this book is for anyone who wants to learn to take apart, understand, and modify black-box software. x86 Software Reverse-Engineering, Cracking, and Counter-Measures is a vital resource for security researchers, reverse engineers and defenders who analyze, research, crack or defend software applications." --
About the Author
STEPHANIE DOMAS is the CISO of Canonical, where she is driving Canonical to be the most trusted computational partner in all of open source. Prior to that she was the Chief Security Technology Strategist at Intel where she owned the cross-Intel security technology strategy across Intel's wide portfolio of products. Stephanie is a passionate educator, strategist, speaker, advisor, and security enthusiast.
CHRISTOPHER DOMAS is a security researcher primarily focused on firmware, hardware, and low level processor exploitation. He is best known for releasing impractical solutions to non-existent problems, including the world's first single instruction C compiler (M/o/Vfuscator), toolchains for generating images in program control flow graphs (REpsych), and Turing-machines in the vi text editor.
9781394277131 9781394199907 1394199902 1394199899 9781394199891 9781394277131 139427713X
10.1002/9781394277131 doi
9781394199884 O'Reilly Media FCB51403-4CB8-4C79-985C-F5C1A78260E8 OverDrive, Inc. http://www.overdrive.com 10649669 IEEE
Computer security.
X86 assembly language (Computer program language)
Reverse engineering.
Hacking.
Software architecture.
Electronic books.
QA76.9.A25 / D66 2024
005.8
x86 software reverse-engineering, cracking, and counter-measures / Stephanie Domas, Christopher Domas. - 1 online resource : illustrations (some color) - - Tech today. . - Tech today. .
Includes index.
"A crystal-clear and practical blueprint to software disassembly. x86 Software Reverse-Engineering, Cracking, and Counter-Measures is centered around the world of disassembling software. It will start with the basics of the x86 assembly language, and progress to how that knowledge empowers you to reverse-engineer and circumvent software protections. No knowledge of assembly, reverse engineering, or software cracking is required. The book begins with a bootcamp on x86, learning how to read, write, and build in the assembly that powers a massive amount of the world's computers. Then the book will shift to reverse engineering applications using a handful of industry favorites such as IDA, Ghidra, Olly, and more. Next, we move to cracking with techniques such as patching and key generation, all harnessing the power of assembly and reverse engineering. Lastly, we'll examine cracking from a defensive perspective. Providing learners with techniques to be a better defender of their own software, or knowledge to crack these techniques more effectively. A practical and hands-on resource for security professionals to hobbyists, this book is for anyone who wants to learn to take apart, understand, and modify black-box software. x86 Software Reverse-Engineering, Cracking, and Counter-Measures is a vital resource for security researchers, reverse engineers and defenders who analyze, research, crack or defend software applications." --
About the Author
STEPHANIE DOMAS is the CISO of Canonical, where she is driving Canonical to be the most trusted computational partner in all of open source. Prior to that she was the Chief Security Technology Strategist at Intel where she owned the cross-Intel security technology strategy across Intel's wide portfolio of products. Stephanie is a passionate educator, strategist, speaker, advisor, and security enthusiast.
CHRISTOPHER DOMAS is a security researcher primarily focused on firmware, hardware, and low level processor exploitation. He is best known for releasing impractical solutions to non-existent problems, including the world's first single instruction C compiler (M/o/Vfuscator), toolchains for generating images in program control flow graphs (REpsych), and Turing-machines in the vi text editor.
9781394277131 9781394199907 1394199902 1394199899 9781394199891 9781394277131 139427713X
10.1002/9781394277131 doi
9781394199884 O'Reilly Media FCB51403-4CB8-4C79-985C-F5C1A78260E8 OverDrive, Inc. http://www.overdrive.com 10649669 IEEE
Computer security.
X86 assembly language (Computer program language)
Reverse engineering.
Hacking.
Software architecture.
Electronic books.
QA76.9.A25 / D66 2024
005.8