首页
社区
课程
招聘
[分享]《逆向工程资源》(Reverse Engineering)
发表于: 2005-11-19 21:49 4443

[分享]《逆向工程资源》(Reverse Engineering)

2005-11-19 21:49
4443
中文名称:逆向工程资源
英文名称:Reverse Engineering
发行时间:2005年
地区:美国
语言:英语
简介:

反向工程:
软件的“反向工程”,或称“逆向工程”,是指对软件的结构、流程、算法、代码等进行逆向拆解和分析。在原创者不愿公布硬件或软件产品的上述技术特征的情况下,竞争者可以利用“反向工程”进行仿制生产,而配套产品生产者则也希望通过“反向工程”生产出在技术上与原产品兼容的设备。由于“反向工程”可导致原产品的核心技术被他人知晓,因此掌握先进技术的软件开发者往往需要在其产品中加入防止“反向工程”的技术措施。



In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in detail the five most important disciplines for security professionals and software developers: Coding, Sockets, Shellcode, Porting Applications, and Coding Security Tools.

"Read every page of this book, understand the content, and use it to your advantage."--Stuart McClure

Download the CodeAll code lines throughout the book are numbered for easy reference and are available for download from www.syngress.com/solutions.

Develop ShellcodeCustomize and optimize never-before-seen shellcode that can exploit almost any system.

Port Public ExploitsFollow step-by-step instructions for porting exploits to work on Windows, Linux, UNIX, and even Macs!

Customize Windows COM ObjectsWrap and automate pre-compiled exploits and security tools such as Nmap, netcat, and hping.

Enhance NiktoDevelop customized code to dramatically improve the performance of the Nikto Web server scanner.

Reverse Engineer Zero DaysLearn to reverse engineer, modify, and re-automate Zero-Day exploit code.

Write NASL ScriptsDevelop scripts for Nessus to discover the latest vulnerabilities.

Identify and Target VulnerabilitiesExamine case studies that reveal how attackers identify and exploit security holes.

Master SocketsDetailed code examples demonstrate socket initialization, closing sockets, reading and writing data.
Your Solutions Membership Gives You Access to:

A comprehensive FAQ page that consolidates all of the key points of this book into an easy-to-search Web page

"From the Author" Forum where the authors post timely updates and links to related sites

The complete code listings from the book

Downloadable chapters from these best-selling books:

Buffer Overflow Attacks: Detect, Exploit, Prevent

Programmer's Ultimate Security DeskRef

Hacking the Code: ASP.NET Web Application Security

Nessus Network Auditing



Book Description
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.
* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products
* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware
* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language

Tool Pack
- System Tools
Windows system variables
Scripting tool kit
Registry Patches Creator
Registry Docs
Reg& REGINI
Reg-Cracking-Engine
MCI doc
Elevate permission application launcher
Dos Batch Programming Guide
CMD Tools
CMD Basic Help

- Other Tools
WinCRC32
Sysinternals process explorer
Systinternals ntregmon
Systinternals ntfilmon
Setup Builder
Scooter Beyond Compare
Rar 3.2 command Line
Install Rite
Evidence Mini HTML Browser
Advance Crc Utility
7 Zip 2.3

- DIZ, Info, Txt Tools
txt2exe
terminal fonts
legacy file
flyingcode NFO viewer
eminence NFO viewer
elton's NFO

- Cracking Tools
WinHEX
W32Dasm
stup_PE
SoftICE
revirgin
ProcDump32
PE Explorer
Patch Maker
IDA to SoftICE symbol loader
FCTR UFX GUI
Datarescue IDA PRO

http://lib.verycd.com/2005/11/01/0000072505.html

[课程]Android-CTF解题方法汇总!

收藏
免费 0
支持
分享
最新回复 (6)
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
2
这个不错的说.很难得.看有点困难,,,
2005-11-19 21:52
0
雪    币: 61
活跃值: (160)
能力值: ( LV9,RANK:170 )
在线值:
发帖
回帖
粉丝
3
That is a good book!
2005-11-19 21:53
0
雪    币: 191
活跃值: (205)
能力值: ( LV9,RANK:250 )
在线值:
发帖
回帖
粉丝
4
前一段从warez上down的。
第一本书down了,没看,不知道怎么样.
第二本看了,不错,是难得的好书
2005-11-24 12:35
0
雪    币: 313
活跃值: (440)
能力值: ( LV12,RANK:530 )
在线值:
发帖
回帖
粉丝
5
很好,我也下了,看了5章了,继续努力当中..
2005-11-26 21:41
0
雪    币: 107
活跃值: (55)
能力值: ( LV4,RANK:50 )
在线值:
发帖
回帖
粉丝
6
就是英文的,比较让人头痛。
2005-11-27 09:23
0
雪    币: 370
活跃值: (15)
能力值: ( LV9,RANK:170 )
在线值:
发帖
回帖
粉丝
7
我也凑份子,已经下了
2005-11-27 12:23
0
游客
登录 | 注册 方可回帖
返回
//