×







We sell 100% Genuine & New Books only!

Implementing Reverse Engineering at Meripustak

Implementing Reverse Engineering by Jitender Narula, BPB Publications

Books from same Author: Jitender Narula

Books from same Publisher: BPB Publications

Related Category: Author List / Publisher List


  • Price: ₹ 999.00/- [ 0.00% off ]

    Seller Price: ₹ 999.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)Jitender Narula
    PublisherBPB Publications
    ISBN9789391030377
    Pages494
    BindingPaperback
    LanguageEnglish
    Publish YearJanuary 2022

    Description

    BPB Publications Implementing Reverse Engineering by Jitender Narula

    In-depth practical demonstration with multiple examples of reverse engineering concepts. Provides a step-by-step approach to reverse engineering, including assembly instructions. Helps security researchers to crack application code and logic using reverse engineering open source tools. Reverse engineering strategies for simple-to-complex applications like Wannacry ransomware and Windows calculator. DESCRIPTION The book ‘Implementing Reverse Engineering’ begins with a step-by-step explanation of the fundamentals of reverse engineering. You will learn how to use reverse engineering to find bugs and hacks in real-world applications. This book is divided into three sections. The first section is an exploration of the reverse engineering process. The second section explains reverse engineering of applications, and the third section is a collection of real-world use-cases with solutions. The first section introduces the basic concepts of a computing system and the data building blocks of the computing system. This section also includes open-source tools such as CFF Explorer, Ghidra, Cutter, and x32dbg. The second section goes over various reverse engineering practicals on various applications to give users hands-on experience. In the third section, reverse engineering of Wannacry ransomware, a well-known Windows application, and various exercises are demonstrated step by step. In a very detailed and step-by-step manner, you will practice and understand different assembly instructions, types of code calling conventions, assembly patterns of applications with the printf function, pointers, array, structure, scanf, strcpy function, decision, and loop control structures. You will learn how to use open-source tools for reverse engineering such as portable executable editors, disassemblers, and debuggers. WHAT YOU WILL LEARN Understand different code calling conventions like CDECL, STDCALL, and FASTCALL with practical illustrations. Analyze and break WannaCry ransomware using Ghidra. Using Cutter, reconstruct application logic from the assembly code. Hack the Windows calculator to modify its behavior. WHO THIS BOOK IS FOR This book is for cybersecurity researchers, bug bounty hunters, software developers, software testers, and software quality assurance experts who want to perform reverse engineering for advanced security from attacks. Interested readers can also be from high schools or universities (with a Computer Science background). Basic programming knowledge is helpful but not required.



    Book Successfully Added To Your Cart