Download
File | |
---|---|
Best of Reverse Engineering - Preview.pdf |
Dear Readers,
We hope you are well. This is a special issue devoted to Reverse Engineering. If you want to know how to do it, this is a MUST-HAVE position in your own library. This e-book is a very practical guide that will show you how to become an expert in reverse engineering. It includes ONLY revised and carefully selected articles and it will be a great source of knowledge for those who want to start a great adventure with reverse engineering.
Always Yours,
Hakin9 Magazine's
Editorial Team
Download Preview
Tabele of Content
-
- What is Reverse Engineering?
by Aman Singh
- What is Reverse Engineering?
-
- Write Your Own Debugger
by Amr Thabet
- Write Your Own Debugger
-
- The Logic Breaks Logic
by Raheel Ahmad
- The Logic Breaks Logic
-
- Malware Discovery and Protection
by Khaled Mahmoud Abd El Kader
- Malware Discovery and Protection
-
- How to Analyze Applications With Olly Debugger?
by Jaromir Horejsi, Malware Analyst at AVAST Software
- How to Analyze Applications With Olly Debugger?
-
- How to use Socat and Wireshark for Practical SSL Protocol Reverse Engineering?
by Shane R. Spencer, Information Technology Professional
- How to use Socat and Wireshark for Practical SSL Protocol Reverse Engineering?
-
- How to Disassemble and Debug Executable Programs on Linux, Windows and Mac OS X?
by Jacek Adam Piasecki, Tester/Programmer
- How to Disassemble and Debug Executable Programs on Linux, Windows and Mac OS X?
-
- Malware Reverse Engineering
by Bamidele Ajayi, OCP, MCTS, MCITP EA, CISA, CISM
- Malware Reverse Engineering
-
- Android Reverse Engineering: an Introductory Guide to Malware Analysis
by Vicente Aguilera Diaz, CISA, CISSP, CSSLP, PCI ASV, ITIL Foundation, CEH|I, ECSP|I, OPSA
- Android Reverse Engineering: an Introductory Guide to Malware Analysis
-
- Deep Inside Malicious PDF
by Yehia Mamdouh, Founder and Instructor of Master Metasploit Courses, CEH, CCNA
- Deep Inside Malicious PDF
-
- How to Identify and Bypass Anti-reversing Techniques
by Eoin Ward, Security Analyst – Anti Malware at Microsoft
- How to Identify and Bypass Anti-reversing Techniques
-
- How to Defeat Code Obfuscation While Reverse Engineering
by Adam Kujawa, Malware Intelligence Analyst at Malwarebytes
- How to Defeat Code Obfuscation While Reverse Engineering
-
- Reverse Engineering – Shellcodes Techniques
by Eran Goldstein, CEH, CEI, CISO, Security+, MCSA, MCSE Security
- Reverse Engineering – Shellcodes Techniques
-
- How to Reverse the Code
by Raheel Ahmad, Writer – Information Security Analyst & eForensics at Hakin9
- How to Reverse the Code
-
- How to Reverse Engineer dot NET Assemblies?
by Soufiane Tahiri, InfoSec Institute Contributor and Computer Security Researcher
- How to Reverse Engineer dot NET Assemblies?
-
- Reversing with Stack-Overflow and Exploitation
by Bikash Dash, RHCSA, RHCE, CSSA
- Reversing with Stack-Overflow and Exploitation
-
- How to Reverse Engineer?
by Lorenzo Xie, The owner of XetoWare.COM
- How to Reverse Engineer?
-
- Reverse Engineering – Debugging Fundamentals
by Eran Goldstein, CEH, CEI, CISO, Security+, MCSA, MCSE Security
- Reverse Engineering – Debugging Fundamentals
-
- Setting Up Your Own Malware Analysis Lab
by Monnappa KA GREM, CEH; Information Security Investigator – Cisco CSIRT at Cisco Systems
- Setting Up Your Own Malware Analysis Lab
-
- Glimpse of Static Malware Analysis
by Ali A. AlHasan MCSE, CCNA, CEH, CHFI,CISA, ISO 27001 Lead auditor
- Glimpse of Static Malware Analysis
-
- Hybrid Code Analysis versus State of the Art Android Backdoors Mobile Malware is evolving... can the good guys beat the new challenges?
by Jan Miller Reverse Engineering, Static Binary Analysis and Malware Signature algorithms specialist at Joe Security LLC
- Hybrid Code Analysis versus State of the Art Android Backdoors Mobile Malware is evolving... can the good guys beat the new challenges?
-
- Next Generation of Automated Malware Analysis and Detection
by Tomasz Pietrzyk Systems Engineer at FireEye
- Next Generation of Automated Malware Analysis and Detection
-
- Advanced Malware Detection using Memory Forensics
by Monnappa KA GREM, CEH; Information Security Investigator – Cisco CSIRT at Cisco Systems
- Advanced Malware Detection using Memory Forensics
-
- Android.Bankun And Other Android Obfuscation Tactics: A New Malware Era
by Nathan Collier Senior Threat Research Analyst w Webroot Software
- Android.Bankun And Other Android Obfuscation Tactics: A New Malware Era