Book descriptionIf you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pro’s interactive interface and programmable development language provide you with complete control over code disassembly and debugging. This is the only book which focuses exclusively on the world’s most powerful and popular took for reverse engineering code.
*Reverse Engineer REAL Hostile Code
To follow along with this chapter, you must download a file called !DANGER!INFECTEDMALWARE!DANGER!... ‘nuff said.
*Portable Executable (PE) and Executable and Linking Formats (ELF)
Understand the physical layout of PE and ELF files, and analyze the components that are essential to reverse engineering.
*Break Hostile Code Armor and Write your own Exploits
Understand execution flow, trace functions, recover hard coded passwords, find vulnerable functions, backtrace execution, and craft a buffer overflow.
Debug in IDA Pro, use a debugger while reverse engineering, perform heap and stack access modification, and use other debuggers.
Anti-reversing, like reverse engineering or coding in assembly, is an art form. The trick of course is to try to stop the person reversing the application. Find out how!
*Track a Protocol through a Binary and Recover its Message Structure
Trace execution flow from a read event, determine the structure of a protocol, determine if the protocol has any undocumented messages, and use IDA Pro to determine the functions that process a particular message.
*Develop IDA Scripts and Plug-ins
Learn the basics of IDA scripting and syntax, and write IDC scripts and plug-ins to automate even the most complex tasks.
Table of contents
- Visit us at www.syngress.com
- About IOActive
- Contributing Authors
- 1. Introduction
- 2. Assembly and Reverse Engineering Basics
- 3. Portable Executable and Executable and Linking Formats
- 4. Walkthroughs One and Two
- Debugging Basics
- Debugging in IDA Pro
- Use of Debugging while Reverse Engineering
- Heap and Stack Access and Modification
- Other Debuggers
- 6. Anti-Reversing
- 7. Walkthrough Four
- 8. Advanced Walkthrough
9. IDA Scripting and Plug-ins
- Basics of IDA Scripting
- IDC Syntax
- Simple Script Examples
- Writing IDC Scripts
- Basics of IDA Plug-ins
- Plug-in Syntax
- Setting up the Development Environment
- Simple Plug-in Examples
- The Indirect Call Plug-in
- Plug-in Development and Debugging Strategies
- Processor Modules
- Third-party Scripting Plug-ins
- Frequently Asked Questions
- Title: Reverse Engineering Code with IDA Pro
- Release date: April 2011
- Publisher(s): Syngress
- ISBN: 9780080558790
You might also like
Certified Ethical Hacker (CEH) Version 10 Cert Guide, 3rd Edition
In this best-of-breed study guide, leading experts Michael Gregg and Omar Santos help you master all …
In Penetration Testing, security researcher and trainer Georgia Weidman provides you with a survey of important …
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System, 2nd Edition
While forensic analysis has proven to be a valuable investigative tool in the field of computer …
The Web Application Hacker's Handbook, 2nd Edition
The highly successful security book returns with a new edition, completely updated Web applications are the …