Skip to Main Content
Reverse Engineering Code with IDA Pro
book

Reverse Engineering Code with IDA Pro

by IOActive
April 2011
Intermediate to advanced content levelIntermediate to advanced
328 pages
6h 56m
English
Syngress
Content preview from Reverse Engineering Code with IDA Pro

Chapter 8. Advanced Walkthrough

Introduction

So now you’ve read the book, and should be able to do some of this on your own. In this chapter, we’re going to look at a real piece of hostile code. The hostile code we’re going to use is real; this means that you should be especially careful when dealing with it yourself because you could possibly do serious harm to your computer and your network. Please be positive you are authorized to analyze the application in your environment. I highly suggest the use of some form of virtualization software, such as VMware. One thing I especially like about VMware is the ability to take snapshots, which allows me to get to specified points and make a restore point. This ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

James C Foster
The Complete Metasploit Guide

The Complete Metasploit Guide

Sagar Rahalkar, Nipun Jaswal

Publisher Resources

ISBN: 9781597492379