Skip to Main Content
Reverse Engineering Code with IDA Pro
book

Reverse Engineering Code with IDA Pro

by IOActive
April 2011
Intermediate to advanced content levelIntermediate to advanced
328 pages
6h 56m
English
Syngress
Content preview from Reverse Engineering Code with IDA Pro

Chapter 3. Portable Executable and Executable and Linking Formats

Introduction

In this chapter we will introduce two common binary executable formats, Portable Executable (PE) and Executable and Linkable Format (ELF). PE is the binary format used in Windows, while ELF is used by many of the Unices. ELF is a replacement for the older a.out format that did not include standardized support for shared libraries. Furthermore, PE is an offshoot of the COFF format, which was used in an earlier Unix, and the author’s understanding is that this is by and large the result ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

James C Foster
The Complete Metasploit Guide

The Complete Metasploit Guide

Sagar Rahalkar, Nipun Jaswal

Publisher Resources

ISBN: 9781597492379