1. Trang chủ
  2. » Kỹ Năng Mềm

reversing secrets of reverse engineering phần 1 pps

62 372 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 62
Dung lượng 1,07 MB

Nội dung

[...]... Tools Hex Workshop 11 0 11 0 11 0 11 2 11 5 11 6 11 8 11 8 11 9 12 1 12 2 12 2 12 3 12 4 12 7 12 9 12 9 13 1 13 1 Miscellaneous Reversing Tools 13 3 Executable-Dumping Tools DUMPBIN PEView PEBrowse Professional 13 3 13 3 13 7 13 7 Conclusion 13 8 Contents Part II Applied Reversing 13 9 Chapter 5 Beyond the Documentation Reversing and Interoperability Laying the Ground Rules Locating Undocumented APIs 14 1 14 2 14 2 14 3 What Are We... Structure Search Loop 1 Search Loop 2 Search Loop 3 Search Loop 4 Reconstructing the Source Code RtlInsertElementGenericTable RtlLocateNodeGenericTable RtlRealInsertElementWorker Splay Trees RtlLookupElementGenericTable RtlDeleteElementGenericTable Putting the Pieces Together 14 4 14 5 14 6 15 1 15 2 15 3 15 5 15 9 16 1 16 3 16 4 16 5 16 5 16 8 17 0 17 8 18 7 18 8 19 3 19 4 Conclusion Chapter 6 19 6 Deciphering File Formats... Reversing 10 1 1 Chapter 1 Foundations What Is Reverse Engineering? Software Reverse Engineering: Reversing Reversing Applications 3 3 4 4 Security-Related Reversing Malicious Software Reversing Cryptographic Algorithms Digital Rights Management Auditing Program Binaries Reversing in Software Development Achieving Interoperability with Proprietary Software Developing Competing Software Evaluating Software... Detecting SoftICE Using the Single-Step Interrupt The Trap Flag Code Checksums Confusing Disassemblers Linear Sweep Disassemblers Recursive Traversal Disassemblers Applications Code Obfuscation Control Flow Transformations Opaque Predicates Confusing Decompilers Table Interpretation 311 312 313 314 314 314 315 315 316 317 318 318 319 320 3 21 3 21 3 21 322 324 324 327 327 328 329 330 3 31 3 31 332 333 334... defining reverse engineering and the various types of applications it has in software, and proceed to demonstrate the connection between low-level software and reverse engineering There is then a brief introduction of the reverse- engineering process and the tools of the trade Finally, there is a discussion on the legal aspects of reverse engineering with an attempt to classify the cases in which reverse engineering. .. able to see much of the interesting stuff by just opening the box Software Reverse Engineering: Reversing Software is one of the most complex and intriguing technologies around us nowadays, and software reverse engineering is about opening up a program’s “box,” and looking inside Of course, we won’t need any screwdrivers on this journey Just like software engineering, software reverse engineering is... 409 409 415 415 415 416 416 417 418 418 419 419 419 4 21 423 424 426 426 428 428 429 430 430 Contents IL Instructions IL Code Samples Counting Items A Linked List Sample Decompilers Obfuscators Renaming Symbols Control Flow Obfuscation Breaking Decompilation and Disassembly Reversing Obfuscated Code XenoCode Obfuscator DotFuscator by Preemptive Solutions Remotesoft Obfuscator and Linker Remotesoft Protector... 96 97 99 99 10 3 10 3 10 4 10 5 Structured Exception Handling Conclusion Chapter 4 10 5 10 7 Reversing Tools Different Reversing Approaches 10 9 11 0 Offline Code Analysis (Dead-Listing) Live Code Analysis Disassemblers IDA Pro ILDasm Debuggers User-Mode Debuggers OllyDbg User Debugging in WinDbg IDA Pro PEBrowse Professional Interactive Kernel-Mode Debuggers Kernel Debugging in WinDbg Numega SoftICE Kernel... Interoperability Competition Copyright Law Trade Secrets and Patents The Digital Millenium Copyright Act DMCA Cases License Agreement Considerations 13 14 14 14 15 15 15 16 17 17 18 19 20 20 22 23 Code Samples & Tools Conclusion Chapter 2 23 23 Low-Level Software High-Level Perspectives 25 26 Program Structure Modules Common Code Constructs Data Management Variables User-Defined Data Structures Lists... this is the very purpose of this book, to teach and demonstrate reverse engineering techniques that can be applied daily, for solving a wide variety of problems But I’m getting ahead of myself For those of you that haven’t been exposed to the concept of software reverse engineering, a little introduction is in order xxiii xxiv Introduction Reverse Engineering and Low-Level Software Before we get into . (Dead-Listing) 11 0 Live Code Analysis 11 0 Disassemblers 11 0 IDA Pro 11 2 ILDasm 11 5 Debuggers 11 6 User-Mode Debuggers 11 8 OllyDbg 11 8 User Debugging in WinDbg 11 9 IDA Pro 12 1 PEBrowse Professional. alt="" 01_ 574 817 ffirs.qxd 3 /16 /05 8:37 PM Page ii Reversing: Secrets of Reverse Engineering 01_ 574 817 ffirs.qxd 3 /16 /05 8:37 PM Page i 01_ 574 817 ffirs.qxd 3 /16 /05 8:37 PM Page ii Eldad Eilam Reversing: . 14 Code-Level Reversing 14 The Tools 14 System-Monitoring Tools 15 Disassemblers 15 Debuggers 15 Decompilers 16 Is Reversing Legal? 17 Interoperability 17 Competition 18 Copyright Law 19 Trade Secrets

Ngày đăng: 14/08/2014, 11:21

TỪ KHÓA LIÊN QUAN

w