mostraligabue
» » Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming

ePub Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming download

by Kris Kaspersky

ePub Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming download
Author:
Kris Kaspersky
ISBN13:
978-1931769228
ISBN:
1931769222
Language:
Publisher:
A-List Publishing (April 1, 2003)
Category:
Subcategory:
Programming
ePub file:
1366 kb
Fb2 file:
1485 kb
Other formats:
lit txt lrf azw
Rating:
4.5
Votes:
496

Hacker Disassembling Uncovered (Uncovered series). Kris Kaspersky is the author of articles on hacking, disassembling, and code optimization.

Hacker Disassembling Uncovered (Uncovered series).

If you are a beginner, you will get tons of useful and updated information from this book. If you don't, learn a bit of C first, and then come back to this book. So, it's important to judge the book by what it is. It's not an introduction to computers or programming.

Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming. Kris Kaspersky is the author of CD Cracking Uncovered, Hacker Debugging Uncovered, and Shellcoder's Programming Uncovered. Series: Uncovered series.

Kris Kaspersky is the author of articles on hacking, disassembling, and code optimization.

Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your. Библиографические данные.

Hacker Disassembling Uncovered. This book is devoted to hacking basics - to the skills needed for working with a debugger and a disassembler. This book opens the door to the wonderful world of security mechanisms, showing you how protection is created, and then bypassed. Lastly, it is for anyone who is engaged constantly or incidentally in writing protections, and who wants to know how to counteract ubiquitous hackers competently and reliably.

Электронная книга "Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming", Kris Kaspersky. Эту книгу можно прочитать в Google Play Книгах на компьютере, а также на устройствах Android и iOS. Выделяйте текст, добавляйте закладки и делайте заметки, скачав книгу "Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming" для чтения в офлайн-режиме.

Gray hat Python : Python programming for hackers and reverse. articulating a particular point of view. Chetan Bhagat's books do both and more. 04 MB·52,511 Downloads. benefit of the trademark owner, with no intention of infringement of the trademark. manual on how untitled. Rahman, in TIME magazine, on Che. Timeless Secrets of Health & Rejuvenation.

Items related to Hacker Disassembling Uncovered: Powerful Techniques. Kaspersky, Kris Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming. ISBN 13: 9781931769228.

Hacker Disassembling Uncovered: Powerful Techniques To Safeguard Your Programming KV-76762 . Misleading titleBy baniThis book is mostly how-to reverse engineer, and precious little about how to safeguard against it.

solid introduction to reverse compilation techniquesBy Brian E. MitchellI thought this was a pretty good book.

Hack In The Box (M) Sdn.

Going beyond the issues of analyzing and optimizing programs as well as creating the means of protecting information, this guide takes on the programming problem of, once having found holes in a program, how to go about disassembling it without its source code. Covered are the hacking methods used to analyze programs using a debugger and disassembler. These methods include virtual functions, local and global variables, branching, loops, objects and their hierarchy, and mathematical operators. Also covered are methods of fighting disassemblers, self-modifying code in operating systems, and executing code in the stack. Advanced disassembler topics such as optimizing compilers and movable code are discussed as well.
  • I thought this was a pretty good book. First, to the 'reviewer' (in quotes since he didnt read the book beyond the very beginning) -- very little of the book makes any use of softice. The tool mostly used is Interactive Disassembler (a commercial tool available from datarescue) but any disassembler will do.

    The book is about the code typically generated by compilers of various forms (mostly c and c++, some pascal as well). If you want to understand the disassembly, you must grok what Christina Cifuentes calls idioms (instruction sequences that have an effect different than the usual intended meaning).

    This book is very much a collection of idioms. It's a good primer to the art of reverse engineering, and maybe readers can move on to general decompilation papers for further study, starting with "Reverse Compilation Techniques" by Ciguentes, and moving on to more modern papers.

  • This book is mostly how-to reverse engineer, and precious little about how to safeguard against it. Sure you could work out your own techniques to frustrate the reversing used in this book, but the author provides few suggestions of his own.

    The book is therefore misleadingly titled. If you want a book to reverse engineer, this is it. If you want a book for how to safeguard against it, look elsewhere.

  • This has the most straightforward exposition of exploits. I used the info as the basis of a testing framework. Kris knows his stuff and shares. This book delivers, but make sure you've got you're brain on and be prepared to find and use the external resource. you don't absolutely need the tools he suggests for all the exploits covered, but they will make the task a lot easier, and are therefore worth it for the time they save you writing your own.

  • Copy protection schemes are to software as locks are to doors: they keep honest people out. This book provides the first insight into the science of disassembling object code for the reader who has been disinclined to search for hacker web sites and zines.

    With a topic this large, the author can be forgiven for presenting only a limited set of examples: C, C++, Pascal on Windows. He shows how to use commercial tools to disassemble object code into assembler and how to identify program structures there, with particular emphasis on language features that produce non-intuitive structures.

    Topics covered include: cracking passwords, identifying key structures in high level languages (the bulk of the book) and how to make your code difficult to analyse using these methods.

    The structures examined include IF-THEN-ELSE, SWITCH-CASE-BREAK, objects, structures, arrays, constants, offsets and variables. The reader is shown how to recognise these objects. Explanations are complete and involve no handwaving.

    A good solid introductory text.

  • I really can't complain about the quality of this book because it is information that until now had to be gathered from dark corners of the web and by immersing yourself in hacker communities and obtaining "zines" and newsletters which were online one day and disappeared the next. Hackers out there NEED more books like this that document reverse engineering.
    The information itself, while extremely valuable, is very hard to follow (steep learning curve here) but that is not entirely the fault of the presentation, which is actually pretty good. This is just a tough subject. Disassembly is an art, it takes quite a bit of guesswork and experience in recognizing patterns. This book gives you a headstart on that, and is a great place to start learning the craft. I don't know why but he recommends some pretty outdated tools, like a DOS hex editor Hiew which I don't care for.
    The book is presented as if it is one of those "uncovered"/"exposed"/"revealed" books that must sell so well. In truth, this book is of only marginal use to someone trying to defend against disassemblers. It makes gestures towards being about "safeguarding your programming" but very little of the book is devoted to that (the last 40 pages of a 580 page book). And, I really wish the book had incorporated a discussion of the executable file format and its different pieces and parts (for this I recommend the article by Matt Pietrek titled "An In-Depth Look into the Win32 Portable Executable File Format" available somewhere online) but that was glossed over.
    That said, if you are doing (Intel x86) disassembly, GET this book, it is a must-have. I hope to see a second edition of this someday.

  • While I agree with all many of the other reviewers here, I have to profess that I thought many of the main topic areas really weren't consistent with hacking. The author takes great pains to write in terms of the circumvention of copy protection mechanisms such as passwords and serial numbers. While I will admit the author demostrates an exceptional knowledge of assembly code and debugging, it would have been nice if he covered a more diverse set of examples. Regardless, taking this book for what it's worth, I would say if you read closely and experiment with the recommended tools you'll take away a far greater understanding of assembly code and the debugging process.