Best of Reverse Engineering

$39.00

45 items sold


Get the access to all our courses via Subscription

Subscribe

Category:

Download
File
Best of Reverse Engineering - Preview.pdf

Dear Readers,

We hope you are well. This is a special issue devoted to Reverse Engineering. If you want to know how to do it, this is a MUST-HAVE position in your own library. This e-book is a very practical guide that will show you how to become an expert in reverse engineering. It includes ONLY revised and carefully selected articles  and it will be a great source of knowledge for those who want to start a great adventure with reverse engineering.

Always Yours,

Hakin9 Magazine's
Editorial Team

Download Preview


Tabele of Content

    • What is Reverse Engineering?
      by Aman Singh

    • Write Your Own Debugger
      by Amr Thabet

    • The Logic Breaks Logic
      by Raheel Ahmad

    • Malware Discovery and Protection 
      by Khaled Mahmoud Abd El Kader

    • How to Analyze Applications With Olly Debugger? 
      by Jaromir Horejsi, Malware Analyst at AVAST Software

    • How to use Socat and Wireshark for Practical SSL Protocol Reverse Engineering? 
      by Shane R. Spencer, Information Technology Professional

    • How to Disassemble and Debug Executable Programs on Linux, Windows and Mac OS X? 
      by Jacek Adam Piasecki, Tester/Programmer

    • Malware Reverse Engineering 
      by Bamidele Ajayi, OCP, MCTS, MCITP EA, CISA, CISM

    • Android Reverse Engineering: an Introductory Guide to Malware Analysis 
      by Vicente Aguilera Diaz, CISA, CISSP, CSSLP, PCI ASV, ITIL Foundation, CEH|I, ECSP|I, OPSA

    • Deep Inside Malicious PDF 
      by Yehia Mamdouh, Founder and Instructor of Master Metasploit Courses, CEH, CCNA

    • How to Identify and Bypass Anti-reversing Techniques 
      by Eoin Ward, Security Analyst – Anti Malware at Microsoft

    • How to Defeat Code Obfuscation While Reverse Engineering 
      by Adam Kujawa, Malware Intelligence Analyst at Malwarebytes

    • Reverse Engineering – Shellcodes Techniques 
      by Eran Goldstein, CEH, CEI, CISO, Security+, MCSA, MCSE Security

    • How to Reverse the Code 
      by Raheel Ahmad, Writer – Information Security Analyst & eForensics at Hakin9

    • How to Reverse Engineer dot NET Assemblies? 
      by Soufiane Tahiri, InfoSec Institute Contributor and Computer Security Researcher

    • Reversing with Stack-Overflow and Exploitation 
      by Bikash Dash, RHCSA, RHCE, CSSA

    • How to Reverse Engineer? 
      by Lorenzo Xie, The owner of XetoWare.COM

    • Reverse Engineering – Debugging Fundamentals 
      by Eran Goldstein, CEH, CEI, CISO, Security+, MCSA, MCSE Security

    • Setting Up Your Own Malware Analysis Lab 
      by Monnappa KA GREM, CEH; Information Security Investigator – Cisco CSIRT at Cisco Systems

    • Glimpse of Static Malware Analysis
      by Ali A. AlHasan MCSE, CCNA, CEH, CHFI,CISA, ISO 27001 Lead auditor

    • Hybrid Code Analysis versus State of the Art Android Backdoors Mobile Malware is evolving... can the good guys beat the new challenges? 
      by Jan Miller Reverse Engineering, Static Binary Analysis and Malware Signature algorithms specialist at Joe Security LLC

    • Next Generation of Automated Malware Analysis and Detection 
      by Tomasz Pietrzyk Systems Engineer at FireEye

    • Advanced Malware Detection using Memory Forensics 
      by Monnappa KA GREM, CEH; Information Security Investigator – Cisco CSIRT at Cisco Systems

    • Android.Bankun And Other Android Obfuscation Tactics: A New Malware Era 
      by Nathan Collier Senior Threat Research Analyst w Webroot Software

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.