Download
File | |
---|---|
HakinEN_TBO_new.pdf |
Dear Readers,
We hope you are well. This is a special issue devoted to Reverse Engineering. If you want to know how to do it, this is a MUST-HAVE position in your own library. This e-book is a very practical guide that will show you how to become an expert in reverse engineering. It includes ONLY revised and carefully selected articles  and it will be a great source of knowledge for those who want to start a great adventure with reverse engineering.
Always Yours,
Hakin9 Magazine's
Editorial Team
If you are not a subscriber and want to buy this magazine click here
Download Preview
Tabele of Content
-
- What is Reverse Engineering?
by Aman Singh
- What is Reverse Engineering?
-
- Write Your Own Debugger
by Amr Thabet
- Write Your Own Debugger
-
- The Logic Breaks Logic
by Raheel Ahmad
- The Logic Breaks Logic
-
- Malware Discovery and ProtectionÂ
by Khaled Mahmoud Abd El Kader
- Malware Discovery and ProtectionÂ
-
- How to Analyze Applications With Olly Debugger?Â
by Jaromir Horejsi, Malware Analyst at AVAST Software
- How to Analyze Applications With Olly Debugger?Â
-
- How to use Socat and Wireshark for Practical SSL Protocol Reverse Engineering?Â
by Shane R. Spencer, Information Technology Professional
- How to use Socat and Wireshark for Practical SSL Protocol Reverse Engineering?Â
-
- How to Disassemble and Debug Executable Programs on Linux, Windows and Mac OS X?Â
by Jacek Adam Piasecki, Tester/Programmer
- How to Disassemble and Debug Executable Programs on Linux, Windows and Mac OS X?Â
-
- Malware Reverse EngineeringÂ
by Bamidele Ajayi, OCP, MCTS, MCITP EA, CISA, CISM
- Malware Reverse EngineeringÂ
-
- Android Reverse Engineering: an Introductory Guide to Malware AnalysisÂ
by Vicente Aguilera Diaz, CISA, CISSP, CSSLP, PCI ASV, ITIL Foundation, CEH|I, ECSP|I, OPSA
- Android Reverse Engineering: an Introductory Guide to Malware AnalysisÂ
-
- Deep Inside Malicious PDFÂ
by Yehia Mamdouh, Founder and Instructor of Master Metasploit Courses, CEH, CCNA
- Deep Inside Malicious PDFÂ
-
- How to Identify and Bypass Anti-reversing TechniquesÂ
by Eoin Ward, Security Analyst – Anti Malware at Microsoft
- How to Identify and Bypass Anti-reversing TechniquesÂ
-
- How to Defeat Code Obfuscation While Reverse EngineeringÂ
by Adam Kujawa, Malware Intelligence Analyst at Malwarebytes
- How to Defeat Code Obfuscation While Reverse EngineeringÂ
-
- Reverse Engineering – Shellcodes TechniquesÂ
by Eran Goldstein, CEH, CEI, CISO, Security+, MCSA, MCSE Security
- Reverse Engineering – Shellcodes TechniquesÂ
-
- How to Reverse the CodeÂ
by Raheel Ahmad, Writer – Information Security Analyst & eForensics at Hakin9
- How to Reverse the CodeÂ
-
- How to Reverse Engineer dot NET Assemblies?Â
by Soufiane Tahiri, InfoSec Institute Contributor and Computer Security Researcher
- How to Reverse Engineer dot NET Assemblies?Â
-
- Reversing with Stack-Overflow and ExploitationÂ
by Bikash Dash, RHCSA, RHCE, CSSA
- Reversing with Stack-Overflow and ExploitationÂ
-
- How to Reverse Engineer?Â
by Lorenzo Xie, The owner of XetoWare.COM
- How to Reverse Engineer?Â
-
- Reverse Engineering – Debugging FundamentalsÂ
by Eran Goldstein, CEH, CEI, CISO, Security+, MCSA, MCSE Security
- Reverse Engineering – Debugging FundamentalsÂ
-
- Setting Up Your Own Malware Analysis LabÂ
by Monnappa KA GREM, CEH; Information Security Investigator – Cisco CSIRT at Cisco Systems
- Setting Up Your Own Malware Analysis LabÂ
-
- Glimpse of Static Malware Analysis
by Ali A. AlHasan MCSE, CCNA, CEH, CHFI,CISA, ISO 27001 Lead auditor
- Glimpse of Static Malware Analysis
-
- Hybrid Code Analysis versus State of the Art Android Backdoors Mobile Malware is evolving... can the good guys beat the new challenges?Â
by Jan Miller Reverse Engineering, Static Binary Analysis and Malware Signature algorithms specialist at Joe Security LLC
- Hybrid Code Analysis versus State of the Art Android Backdoors Mobile Malware is evolving... can the good guys beat the new challenges?Â
-
- Next Generation of Automated Malware Analysis and DetectionÂ
by Tomasz Pietrzyk Systems Engineer at FireEye
- Next Generation of Automated Malware Analysis and DetectionÂ
-
- Advanced Malware Detection using Memory ForensicsÂ
by Monnappa KA GREM, CEH; Information Security Investigator – Cisco CSIRT at Cisco Systems
- Advanced Malware Detection using Memory ForensicsÂ
-
- Android.Bankun And Other Android Obfuscation Tactics:Â A New Malware EraÂ
by Nathan Collier Senior Threat Research Analyst w Webroot Software
- Android.Bankun And Other Android Obfuscation Tactics:Â A New Malware EraÂ
If you are not a subscriber and want to buy this magazine click here
Download
File | |
---|---|
HakinEN_TBO_new.pdf |
.