mostraligabue
» » Hacker Disassembling Uncovered (Uncovered series)

ePub Hacker Disassembling Uncovered (Uncovered series) download

by Kris Kaspersky

ePub Hacker Disassembling Uncovered (Uncovered series) download
Author:
Kris Kaspersky
ISBN13:
978-1931769648
ISBN:
1931769648
Language:
Publisher:
A-List Publishing; 2nd edition (February 1, 2007)
Category:
Subcategory:
Programming
ePub file:
1752 kb
Fb2 file:
1912 kb
Other formats:
txt lrf rtf azw
Rating:
4.6
Votes:
634

Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming. Kris Kaspersky is the author of CD Cracking Uncovered, Hacker Debugging Uncovered, and Shellcoder's Programming Uncovered. Series: Uncovered series.

Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming.

Hacker Disassembling Uncovered (Uncovered series). Kris Kaspersky is the author of articles on hacking, disassembling, and code optimization.

Hacker Disassembling Uncovered. This book is devoted to hacking basics - to the skills needed for working with a debugger and a disassembler. This book opens the door to the wonderful world of security mechanisms, showing you how protection is created, and then bypassed. Lastly, it is for anyone who is engaged constantly or incidentally in writing protections, and who wants to know how to counteract ubiquitous hackers competently and reliably.

book by Kris Kaspersky

book by Kris Kaspersky. Going beyond the issues of analyzing and optimizing programs as well as creating the means of protecting information, this guide takes on the programming problem of, once having found holes in a program, how to go about disassembling it without its source code. Covered are the hacking methods used to analyze programs using a debugger and disassembler.

articulating a particular point of view. Chetan Bhagat's books do both and more. Rahman, in TIME magazine, on Che. Load more similar PDF files. PDF Drive investigated dozens of problems and listed the biggest global issues facing the world today. Let's Change The World Together. Pdfdrive:hope Give books away.

Kris Kaspersky is the author of CD Cracking Uncovered, Code Optimization, and Hacker Disassembling Uncovered. Библиографические данные. Hacker Debugging Uncovered. Издание: иллюстрированное.

Kris Kaspersky is the author of CD Cracking Uncovered, Hacker Debugging Uncovered, and Shellcoder's Programming Uncovered. Bibliographic information. Hacker Disassembling Uncovered, 2nd ed. Author.

Hacker Disassembling Uncovered book. Goodreads helps you keep track of books you want to read. Start by marking Hacker Disassembling Uncovered as Want to Read: Want to Read savin. ant to Read.

Hacker Disassembling Uncovered By Kris Kaspersky 1-931769-22-2 03 04 7 6 5 4 3 2 1 A-LIST, LLC titles are . All brand names and product names mentioned in this book are trademarks or service marks of their respective companies. Any omission or misuse (of any kind) of service marks or trademarks should not be regarded as intent to infringe on the property of others. The publisher recognizes and respects all marks used by companies, manufacturers, and developers as a means to distinguish their products. Hacker Disassembling Uncovered By Kris Kaspersky.

Going beyond the issues of analyzing and optimizing programs as well as creating the means of protecting information, this guide takes on the programming problem of how to go about disassembling a program with holeswithout its source code. Detailing hacking methodsused to analyzeprograms using a debugger and disassembler such as virtual functions, local and global variables, branching, loops, objects and their hierarchy, and mathematical operators, this guidecovers methods of fighting disassemblers, self-modifying code in operating systems, and executing code in the stack. Advanced disassembler topics such as optimizing compilers and movable code are discussed as well, and aCD-ROM that contains illustrations and the source codes for the programs is also included.
  • Let me first say that this 2nd edition book is, in my opinion, the best Reverse Engineering book available based on book resources available as of mid-2016. This edition gives in-depth coverage on a large variety of hacking/security/reverse engineering topics that no other books even mention. I don't know what conspiracy caused this book to be out of print, but I highly recommend you grab a copy while you still can! Stuff in here that isn't in other books include working examples of writing a "cracker" loader (a.k.a. "online patcher") and how Windows Vista driver's digital signatures can be bypassed. Whether or not Microsoft has plugged that hole by now is another matter, but its still great to see these details. Since the book is from 2007, you can certainly expect some outdated material like the SoftIce info.

    Another note is that this book is a COMPLETE rewrite from the first edition. The first edition focuses mainly on recognizing the way C/C++ language is translated into assembly using different compilers. The 2nd edition has all of that material removed. Because I believe the information in the first edition is still applicable and useful, I recommend getting BOTH editions for your bookshelf as there is almost no duplication. The only thing I would have done differently if I was the author is to call this book by a different name, rather than
    2nd edition of a completely different book. But that is only a minor detail. I hope Kaspersky will follow this book up with another one.

  • This book is one of a kind in giving kernel, assembly, machine and program level patch, repair and reverse engineering techniques. The bad news is that it is floating around with disc for $3 grand. The good news is that the pdf is now free online if you google it, and the code also is on two different websites in the Netherlands.

    With the preponderance of embedded programs and hacks today, it is simply astonishing that there are so few texts that go into detail on holes in programs, whether malware or legacy code with problems. Unless you're looking at circuits, can't find many others that cover this level. There also is a free course at hack terror dot com on interpreter sploits, but not RE for programs as far as I can tell. Highly Recommended.

  • I've only read some of the book. I really just wanted to point out that nobody should pay the ridiculous prices people are charging and instead go to the author's website and download it for free. It's not in the best digital format (the book is released as several files, each relating to a chapter and has a file type of 'doc' for word processors), but you could always just combine them all together and convert it into a PDF format for a quick method of keeping on any portable device you like. The content of the CD is also included.

  • I read the 2nd edition of this book, so I will be referring to it.

    First of all, let me tell you that is a VERY GOOD introduction to Reverse Engineering. If you are a beginner, you will get tons of useful and updated information from this book. For sure you will learn, and let me tell you that the info in this book is worth every penny. You will get hands-on experience not only on rev-eng, but also a very good idea about all the software around it. When you are new to the reverse-engineering world, it is very difficult to get started because of the amount of information on the net. Too much is sometimes less because you end up in circles from tutorial to tutorial, without making good bases.
    If you follow this book from cover to cover, you will "get it". You will learn. You will know how to debug/disassemble a program and patch it to alter the way it behaves.

    Warning: if you are a TOTAL beginner (who does not know any programming language at all) this book is not for you. Kris assumes that you know at least a bit of C. He won't get into the details of what a pointer is. You should know that if you want to do reversing. If you don't, learn a bit of C first, and then come back to this book.
    So, it's important to judge the book by what it is. It's not an introduction to computers or programming. It is a VERY GOOD introduction to Reverse Engineering. Having said that, let's start!

    Pros --> Easy to follow, full of useful and updated [2008] information. You will really learn a lot from it if you don't know how to use debuggers/disassemblers. You will learn a bit IDA, OllyDBG, Hiew, and more than a bit of Soft-ICE. Also, you will learn how to get started with API monitors, profilers, etc.

    Cons --> The book has a few not-so-important errors, but you will catch'em if you are awake. The translation is not the best, and sometimes the words are mixed up a bit.

    One caveat: I skip everything related to Unix/Linux because I do not rev-eng on those platforms. So, I will speak only about Windows chapters.

    Chapter 1: it introduces the "tools of the trade" very well. It's really worth reading because knowing what tools are out there and what they can do for you will save a lot of time when reversing. API monitors and profilers are worth using if you want to get to the point fast. Reverse Engineering is not hard, what is hard sometimes is to find the exact piece of code that you need to reverse/change. Monitors and spies will help you to find those points faster.

    Chapter 3: speaks about virtual machines and emulators. Excellent introduction to this area. Some programs (virus, trojans or any malware) may infect your computer. What could be better than having a virtual machine where you can try everything without fear? This is the point of the chapter. Differences between virtualization software. By the way, I personally use Virtual Box and I prefer it over VMWare. Reason? Speed! The startup-time of a frozen machine is INCREDIBLY faster in VBox than VMware. Once the VM is running, the performance is pretty much the same.
    If you work a lot with virtual machines (you will if you plan to reverse), give Virtual Box a try. Do not go straight to VMWare. Try both and decide by yourself which one is better for the job you need to do.

    Chapter 4: different assemblers. I personally was not interested too much in this chapter because I'm a Windows guy so there's not too much room for choices: MASM is the way to go. It's almost a standard. You have books on the subject, communities, packages, IDEs, etc. Of course the other ones may be good, but if you don't have a lot of time to invest on research, go with MASM.
    By the way, don't be afraid if this seems to be too much information. The book won't use MASM or any assembler, it simply introduces you to the different assemblers. In other words, you don't have to know assembler in advance to read this book. Go ahead and don't be afraid because Kris explains the instructions at the same times as he uses them.

    Chapter 5: shows you different protection mechanisms and how to bypass them. The chapter is not a hands-on, but a plain English explanation of the protections and bypasses.

    Chapter 6: this is a real hands on, and a very good one! You create your own C program and crack it! The good thing is that Kris shows you the very basics here. How to actually understand your program using dumpbin. You will bypass the protection (it's just a password, but still a good example) with basic tools, slowly moving to more complex ones: from dumpbin, passing thru Hiew until IDA.
    After playing with your own program, you will try to bypass the protection of a commercial software. Keep in mind that this is for practicing at home only. DO NOT distribute or use.
    The most important thing is this chapter is not only that you will learn the very basics, but you will also learn -for example- how IDA or HIEW do to find references to text-strings, code, etc. Very cool.

    Chapter 7: debugging. He uses Soft-ICE to show you how to place breakpoint on Windows APIs, messages, data, etc. You can 'port' this knowledge to other debuggers if you don't like Soft-ICE

    Chapter 10: how to create logs using Soft-ICE, how to debug using OllyDBG. Don't be discouraged by the usage of Soft-ICE. If you want, just read those pages and do not use it, but read them! It's very interesting how he creates a small but efficient logger using Soft-ICE + the Macros of FAR Manager. Again: maybe you won't use that, but read it so you will understand the mind behind the book. He really get things done, no matter how.
    After playing a bit with SoftICE he presents OllyDBG and many of its features.
    By the end of the chapter, the author touches a bit of "cracking by coverage". Which basically means: running a program twice and compare the differences to see where the protection is. The example uses a date-trial period, so you first run the program when it still runs, and create coverage1.txt. Then, you set the computer date so the program refuses to execute (trial period expired), and save the log as coverage2.txt. After that, you compare both logs (with a tool that you build yourself in 5 minutes) and see the difference. Got it! Without even debugging a line of code, you can patch it! Very good technique.

    Chapter 11: PE format, X-Code (like code caves), etc. It shows you how to insert code in a binary (exe) file the same way viruses do.

    Chapter 13: disassembling 64 bits. I did not read it.

    Chapter 15: patching advanced techniques. How to change low level stuff of your WinOS. How to recover from a Blue Screen of Death.

    Chapters 17, 18, and 19: anti-debugging techniques and how to overcome them. Unpacking techniques using different approaches including the universal one, dumping the image to the disk, rebuild the import table, etc. Obfuscated programs and how to deal with them.

    Chapter 21: debugging and disassembling malware. I did not read it.

    Conclusion: a goldmine for beginners. Useful for intermediates. Interesting for advanced people because they might find novel techniques here. A good read.

  • Not sure why amazon doesn't carry the kindle edition; but in case anyone wants buy a digital copy, you could find this book on Google books for $5 dollars...
    books.google.com/books?id=W6HVAwAAQBAJ