Detect potentials bugs in your code or program and develop your own tools using the Ghidra reverse engineering framework developed by the NSA project
Key Features:
Make the most of Ghidra on different platforms such as Linux, Windows, and macOS
Leverage a variety of plug-ins and extensions to perform disassembly, assembly, decompilation, and scripting
Discover how you can meet your cybersecurity needs by creating custom patches and tools
Book Description:
Ghidra, an open source software reverse engineering (SRE) framework created by the NSA research directorate, enables users to analyze compiled code on any platform, whether Linux, Windows, or macOS. This book is a starting point for developers interested in leveraging Ghidra to create patches and extend tool capabilities to meet their cybersecurity needs.
You'll begin by installing Ghidra and exploring its features, and gradually learn how to automate reverse engineering tasks using Ghidra plug-ins. You'll then see how to set up an environment to perform malware analysis using Ghidra and how to use it in the headless mode. As you progress, you'll use Ghidra scripting to automate the task of identifying vulnerabilities in executable binaries. The book also covers advanced topics such as developing Ghidra plug-ins, developing your own GUI, incorporating new process architectures if needed, and contributing to the Ghidra project.
By the end of this Ghidra book, you'll have developed the skills you need to harness the power of Ghidra for analyzing and avoiding potential vulnerabilities in code and networks.
What You Will Learn:
Get to grips with using Ghidra's features, plug-ins, and extensions
Understand how you can contribute to Ghidra
Focus on reverse engineering malware and perform binary auditing
Automate reverse engineering tasks with Ghidra plug-ins
Become well-versed with developing your own Ghidra extensions, scripts, and features
Automate the task of looking for vulnerabilities in executable binaries using Ghidra scripting
Find out how to use Ghidra in the headless mode
Who This Book Is For:
This SRE book is for developers, software engineers, or any IT professional with some understanding of cybersecurity essentials. Prior knowledge of Java or Python, along with experience in programming or developing applications, is required before getting started with this book.
Автор: Alrabaee Saed, Debbabi Mourad, Shirani Paria Название: Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting ISBN: 3030342409 ISBN-13(EAN): 9783030342401 Издательство: Springer Цена: 139750.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications.
Автор: Alrabaee Saed, Debbabi Mourad, Shirani Paria Название: Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting ISBN: 3030342379 ISBN-13(EAN): 9783030342371 Издательство: Springer Рейтинг: Цена: 139750.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications.
Автор: Steve Humphrey Название: That D----d Brownlow: Being a Saucy and Malicious Description of Fighting Parson William Gannaway Brownlow ISBN: 1469638223 ISBN-13(EAN): 9781469638225 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 24950.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: Published in 1978, this book tells the story of William Gannaway Brownlow, a Methodist minister, Whig politician, author of a Civil War bestseller, and anti-Confederate who documented the trials and tribulations of pro-Union mountaineers in east Tennessee. Steve Humphrey tells the story of this man who could be relentless with his enemies and generous with his friends.
Why do humans get angry with objects? Why is it that a malfunctioning computer, a broken tool, or a fallen glass causes an outbreak of fury? How is it possible to speak of an inanimate object’s recalcitrance, obstinacy, or even malice? When things assume a will of their own and seem to act out against human desires and wishes rather than disappear into automatic, unconscious functionality, the breakdown is experienced not as something neutral but affectively—as rage or as outbursts of laughter. Such emotions are always psychosocial: public, rhetorically performed, and therefore irreducible to a “private” feeling. By investigating the minutest details of life among dysfunctional household items through the discourses of philosophy and science, as well as in literary works by Laurence Sterne, Jean Paul, Friedrich Theodor Vischer, and Heimito von Doderer, Kreienbrock reconsiders the modern bourgeois poetics that render things the way we know and suffer them.
Why do humans get angry with objects? Why is it that a malfunctioning computer, a broken tool, or a fallen glass causes an outbreak of fury? How is it possible to speak of an inanimate object’s recalcitrance, obstinacy, or even malice? When things assume a will of their own and seem to act out against human desires and wishes rather than disappear into automatic, unconscious functionality, the breakdown is experienced not as something neutral but affectively—as rage or as outbursts of laughter. Such emotions are always psychosocial: public, rhetorically performed, and therefore irreducible to a “private” feeling. By investigating the minutest details of life among dysfunctional household items through the discourses of philosophy and science, as well as in literary works by Laurence Sterne, Jean Paul, Friedrich Theodor Vischer, and Heimito von Doderer, Kreienbrock reconsiders the modern bourgeois poetics that render things the way we know and suffer them.
Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2) ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz