Availability: In Stock

Practical reverse engineering x86, x64, ARM, Windows Kernel, reversing

Original price was: 108 ؋.Current price is: 75 ؋.

A hands‑on, practical guide to reversing modern software across x86, x64, and ARM architectures, including Windows kernel internals, common obfuscation techniques, and real-world reversing workflows.

توضیحات

Medium Description (Expanded):
Practical Reverse Engineering teaches developers, malware analysts, and security researchers how to analyze and understand compiled binaries by combining theory with extensive, practical examples. The book walks through assembly basics for x86, x64, and ARM, then demonstrates how to apply static and dynamic analysis techniques using industry tools (disassemblers/debuggers, e.g., IDA, WinDbg, OllyDbg/Ghidra, dynamic instrumentation). Coverage includes Windows user‑mode and kernel‑mode internals, calling conventions, memory layout, PE file structure, and common anti‑analysis and obfuscation methods.

Chapters present worked examples: unpacking and deobfuscating binaries, tracing program flow, extracting strings and resources, reconstructing algorithms, and debugging kernel drivers. The book also covers reversing network protocols, interpreting compiler optimizations, and practical strategies for documenting findings and creating reproducible analysis. Emphasis is on real workflows you can use immediately—from reading assembly and recognizing patterns to using debuggers and tracing system calls—making it suitable for intermediate practitioners who want to move from theory to effective hands‑on reversing.

توضیحات تکمیلی

نویسنده

, ,

تعداد صفحات

383

فرمت کتاب

حجم فایل

11.0 MB

نوع فایل

Pdf

زبان

English

نقد و بررسی‌ها

هنوز بررسی‌ای ثبت نشده است.

اولین کسی باشید که دیدگاهی می نویسد “Practical reverse engineering x86, x64, ARM, Windows Kernel, reversing”
برای مطالعه آنلاین کتاب لطفا وارد حساب کاربری خود شوید.

Alexandre Gazet

Author information not yet available.

Please log in as an administrator to process author information.