Skocz do zawartości

Aktywacja nowych użytkowników
Zakazane produkcje

  • advertisement_alt
  • advertisement_alt
  • advertisement_alt
bookbb

Ghidra Software Reverse-Engineering for Beginners

Rekomendowane odpowiedzi

d995696e4eb4f1efa05edd180d591250.webp
Ghidra Software Reverse-Engineering for Beginners: Master the art of debugging, from understanding code to mitigating threats by David Álvarez Pérez, Ravikant Tiwari
English | January 17, 2025 | ISBN: 1835889832 | 446 pages | EPUB | 45 Mb
Learn how to use Ghidra to analyze your code for potential vulnerabilities and examine both malware and network threats!

Key FeaturesMake the most of Ghidra on different platforms such as Linux, Windows, and macOSUnlock the potential of plug-ins and extensions for disassembly, assembly, decompilation, and scriptingLearn advanced concepts like binary diffing, debugging, unpacking real-world malware samples, and reverse engineering ransomware
Book Description
Written by David Álvarez Pérez, a senior malware analyst at Gen Digital Inc., and Ravikant Tiwari, a senior security researcher at Microsoft, with expertise in malware and threat detection, this book is a complete guide to using Ghidra for examining malware, making patches, and customizing its features for your cybersecurity needs.
This updated edition walks you through implementing Ghidra's capabilities and automating reverse-engineering tasks with its plugins. You'll learn how to set up an environment for practical malware analysis, use Ghidra in headless mode, and leverage Ghidra scripting to automate vulnerability detection in executable binaries. Advanced topics such as creating Ghidra plugins, adding new binary formats, analyzing processor modules, and contributing to the Ghidra project are thoroughly covered too.
This edition also simplifies complex concepts such as remote and kernel debugging and binary diffing, and their practical uses, especially in malware analysis. From unpacking malware to analyzing modern ransomware, you'll acquire the skills necessary for handling real-world cybersecurity challenges.
By the end of this Ghidra book, you'll be adept at avoiding potential vulnerabilities in code, extending Ghidra for advanced reverse-engineering, and applying your skills to strengthen your cybersecurity strategies.
What you will learnDevelop and integrate your own Ghidra extensionsDiscover how to use Ghidra in headless modeExtend Ghidra for advanced reverse-engineeringPerform binary differencing for use cases such as patch and vulnerability analysisPerform debugging locally and in a remote environmentApply your skills to real-world malware analysis scenarios including ransomware analysis and unpacking malwareAutomate vulnerability detection in executable binaries using Ghidra scripting
Who this book is for
This book is for software engineers, security researchers, and professionals working in software development and testing who want to deepen their expertise in reverse engineering and cybersecurity. Aspiring malware analysts and vulnerability researchers will also benefit greatly. Prior experience with Java or Python and a foundational understanding of programming is recommended.
Table of ContentsGetting Started with GhidraAutomating RE Tasks with Ghidra ScriptsGhidra Debug ModeUsing Ghidra ExtensionsReversing Malware Using GhidraScripting Malware AnalysisUsing Ghidra's Headless AnalyzerBinary DiffingAuditing Program BinariesScripting Binary AuditsDeveloping Ghidra PluginsIncorporating New Binary FormatsAnalyzing Processor ModulesContributing to the Ghidra CommunityExtending Ghidra for Advanced Reverse-EngineeringDebuggingUnpacking in-the-Wild MalwareReverse-Engineering Ransomware

Download Links

Ukryta Zawartość

    Treść widoczna tylko dla użytkowników forum DarkSiders. Zaloguj się lub załóż darmowe konto na forum aby uzyskać dostęp bez limitów.

Udostępnij tę odpowiedź


Odnośnik do odpowiedzi
Udostępnij na innych stronach

Dołącz do dyskusji

Możesz dodać zawartość już teraz a zarejestrować się później. Jeśli posiadasz już konto, zaloguj się aby dodać zawartość za jego pomocą.

Gość
Dodaj odpowiedź do tematu...

×   Wklejono zawartość z formatowaniem.   Usuń formatowanie

  Dozwolonych jest tylko 75 emoji.

×   Odnośnik został automatycznie osadzony.   Przywróć wyświetlanie jako odnośnik

×   Przywrócono poprzednią zawartość.   Wyczyść edytor

×   Nie możesz bezpośrednio wkleić grafiki. Dodaj lub załącz grafiki z adresu URL.


×
×
  • Dodaj nową pozycję...

Powiadomienie o plikach cookie

Korzystając z tej witryny, wyrażasz zgodę na nasze Warunki użytkowania.