BOOKS - PROGRAMMING - x86 Software Reverse-Engineering, Cracking, and Counter-Measure...
x86 Software Reverse-Engineering, Cracking, and Counter-Measures - Stephanie Domas, Christopher Domas 2024 EPUB Wiley BOOKS PROGRAMMING
US $5.82

Views
983757
x86 Software Reverse-Engineering, Cracking, and Counter-Measures
Author: Stephanie Domas, Christopher Domas
Year: 2024
Number of pages: 320
Format: EPUB
File size: 39.5 MB
Language: ENG

A crystal-clear and practical blueprint to software disassembly. x86 Software Reverse-Engineering, Cracking, and Counter-Measures is centered around the world of disassembling software. It will start with the basics of the x86 assembly language, and progress to how that knowledge empowers you to reverse-engineer and circumvent software protections. No knowledge of assembly, reverse engineering, or software cracking is required. Reverse engineering and software cracking are disciplines with a long, rich history. For decades, software developers have attempted to build defenses into their applications to protect intellectual property or to prevent modifications to the program code. The art of cracking has been around nearly as long as reverse engineers have been examining and modifying code for fun or profit. The book begins with a bootcamp on x86, learning how to read, write, and build in the assembly that powers a massive amount of the world's computers. Then the book will shift to reverse engineering applications using a handful of industry favorites such as IDA, Ghidra, Olly, and more. Next, we move to cracking with techniques such as patching and key generation, all harnessing the power of assembly and reverse engineering. Lastly, we'll examine cracking from a defensive perspective. Providing learners with techniques to be a better defender of their own software, or knowledge to crack these techniques more effectively. From security professionals to hobbyists, this book is for anyone who wants to learn to take apart, understand, and modify black-box software.

You may also be interested in: