Reverse Engineering Books

Hacking 2009. 1. 28. 11:03

Shellcoder’s Programming Uncovered September 15, 2008

Posted by reversengineering in E-BOOK.
add a comment

Shellcoder’s Programming Uncovered
Author(s):  Kris Kaspersky
Publisher: A-List Publishing
Date     : 2005
Pages    : 500
Format   : CHM
OCR      : Yes
Quality  :
Language : English
ISBN     : 193176946X
How hackers, viruses, and worms attack computers from the Internet and exploit security holes in software is explained in this outline of antivirus software, patches, and firewalls that try in vain to withstand the storm of attacks. Some software’s effectiveness exists only in the imaginations of its developers because they prove unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems (both Windows and Unix), and how to do away with security holes altogether. Unpublished advanced exploits and techniques in both C and Assembly languages are included.

About the Author

Kris Kaspersky is a technical writer and the author of CD Cracking Uncovered, Code Optimization, and Hacker Disassembling Uncovered.

Table of Contents

Shellcoder’s Programming Uncovered
Introduction

Part I - Introduction to Shellcoding
Chapter 1 - Required Tools
Chapter 2 - Assembly Language - Quick Start
Chapter 3 - Hacking Using GPRS Uncovered

Part II - Overflow Errors
Chapter 4 - Buffers Subject to Overflow (Lane of Monsters)
Chapter 5 - Exploiting SEH
Chapter 6 - Specifiers Under Control
Chapter 7 - Practical Overflow Example
Chapter 8 - Searching for Overflowing Buffers
Chapter 9 - Methods of Protecting Buffers Against Overflow

Part III - Secrets of Designing Shellcode
Chapter 10 - Shellcoding Problems
Chapter 11 - The Technique of Writing Portable Shellcode
Chapter 12 - Self-Modification Basics
Chapter 13 - Playing Hide-and-Seek Under Linux
Chapter 14 - Capturing Ring 0 Under Linux
Chapter 15 - Compiling and Decompiling Shellcode

Part IV - Network Worms and Local Viruses
Chapter 16 - Life Cycle of a Worm
Chapter 17 - Local Viruses in the UNIX World
Chapter 18 - Viruses in Scripts
Chapter 19 - ELF Files
Chapter 20 - Method of Capturing Control
Chapter 21 - Main Symptoms of Virus Infection
Chapter 22 - Simplest Windows NT Virus

Part V - Firewalls, Honeypots, and Other Protection Systems
Chapter 23 - Bypassing Firewalls
Chapter 24 - Escaping through the Firewall
Chapter 25 - Organizing a Remote Shell Under UNIX and Windows NT
Chapter 26 - Hackerz Love Honey
Chapter 27 - Sniffing a LAN
Chapter 28 - Databases Under Attack

Part VI - Exotic Objects for Insertion
Chapter 29 - Attacking Bluetooth
Chapter 30 - Economizing on GPRS
Chapter 31 - Legends and Myths about Flashing BIOS
Chapter 32 - Viruses Infecting BIOS
CD Description
List of Figures
List of Tables
List of Listings

http://rapidshare.com/files/145479299/193176946X.chm

if u like all this book buy it.

Reverse Engineering September 15, 2008

Posted by reversengineering in E-BOOK.
add a comment

Reverse Engineering
Author(s): Linda M. Wills (Editor), Philip Newcomb
Publisher: Springer
Date     : 1996
Pages    : 188
Format   : PDF
OCR      : Y
Quality  :
Language :
ISBN     : 0792397568
Product Description
Reverse Engineering brings together in one place important contributions and up-to-date research results in this important area.
Reverse Engineering serves as an excellent reference, providing insight into some of the most important issues in the field.
Product Details

* Hardcover: 188 pages
* Publisher: Springer (July 31, 1996)
* Language: English
* ISBN-10: 0792397568
* ISBN-13: 978-0792397564
http://rapidshare.com/files/145476429/RevEngin.pdf

Reverse Engineering: An Industrial Perspective September 15, 2008

Posted by reversengineering in E-BOOK.
add a comment

Reverse Engineering: An Industrial Perspective
Author(s): Vinesh Raja (Editor), Kiran J. Fernandes
Publisher: Springer
Date     : 2007
Pages    : 242
Format   : PDF
OCR      : Y
Quality  :
Language :
ISBN     : 184628855X

Product Description

Reverse engineering is the process of discovering the technological principles of an object or component through analysis of its structure and function. Such analysis can then be used to redesign the object very quickly using computer-aided design in concert with rapid-manufacturing processes to produce small numbers of components adapted to the needs of a particular customer. This way of working has huge benefits of speed and flexibility over traditional mass-production-based design and manufacturing processes.

This edited collection of essays from world-leading academic and industrial authors yields insight into all aspects of reverse engineering:

The methods of reverse engineering analysis are covered, with special emphasis on the investigation of surface and internal structures.

Frequently-used hardware and software are assessed and advice given on the most suitable choice of system.

Rapid prototyping is introduced and its relationship with successful reverse engineering is discussed.

Importantly, legal matters surrounding reverse engineering are addressed as are other barriers to the adoption of these techniques.

Applications of reverse engineering in three significant areas: automotive, aerospace, and medical engineering are reported in depth.

Reverse Engineering is a “must have” title for anyone working with advanced modern manufacturing technologies, either with a view to researching and improving them further or to making their company leaner and more agile in a competitive manufacturing marketplace.

About the Author

Professor Vinesh Raja is a Professorial Fellow in Informatics at the University of Warwick. He is in-charge of the Informatics Group, which encompasses the Virtual Reality Center (VRC) and the Collaborative Product Commerce Center (CPC) at the Warwick Manufacturing Group. He focuses on augmenting and extending everyday, learning and work activities with interactive technologies that move beyond the desktop. This involves designing enhanced user experiences through appropriating and assembling a diversity of technologies including haptics, handheld and pervasive computing. The main focus of his research is not the technology per se but the design and integration of the digital representations that are presented via them to support social and cognitive activities in ways that extend current capabilities.

Dr. Kiran Jude Fernandes is the 40th Anniversary Research Lecturer in Management at the University of York. He has been a pioneer in the systematic study of Information Modelling Techniques and Tools and has studied their evolution using techniques from the Biological Sciences Domain. His research and teaching interests include strategic uses of information systems, information management, and the impact of information technology on the risks and benefits of outsourcing and strategic alliances. Prior to joining the University of York, Kiran worked at the University of Warwick and the NASA John C. Stennis Space Center.
Product Details

* Hardcover: 242 pages
* Publisher: Springer; 1 edition (December 6, 2007)
* Language: English
* ISBN-10: 184628855X
* ISBN-13: 978-1846288555
http://rapidshare.com/files/145474936/Fring.pdf

Exploiting Software_ How to Break Code September 15, 2008

Posted by reversengineering in E-BOOK.
add a comment

Author(s):  Greg Hoglund, Gary McGraw
Publisher: Addison-Wesley Professional
Date     : 2004
Pages    : 512
Format   : PDF
OCR      : Yes
Quality  :
Language : English
ISBN     : 0201786958

How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys?  What tools can be used to break software? This book provides the answers.  Exploiting Software is loaded with examples of real attacks, attack patterns, tools, and  techniques used by bad guys to break software. If you want to protect your software from  attack, you must first learn how real attacks are really carried out.  This must-have book may shock you-and it will certainly educate you. Getting beyond the script kiddie treatment found in many hacking books, you will learn about

* Why software exploit will continue to be a serious problem.
* When network security mechanisms do not work
* Attack patterns
* Reverse engineering
* Classic attacks against server software
* Surprising attacks against client software
* Techniques for crafting malicious input
* The technical details of buffer overflows
* Rootkits

Exploiting Software is filled with the tools, concepts, and knowledge necessary to break
software.

Amazon.com
Computing hardware would have no value without software; software tells hardware what to do. Software therefore must have special authority within computing systems. All computer security problems stem from that fact, and Exploiting Software: How to Break Code shows you how to design your software so it’s as resistant as possible to attack. Sure, everything’s phrased in offensive terms (as instructions for the attacker, that is), but this book has at least as much value in showing designers what sorts of attacks their software will face (the book could serve as a checklist for part of a pre-release testing regimen). Plus, the clever reverse-engineering strategies that Greg Hoglund and Gary McGraw teach will be useful in many legitimate software projects. Consider this a recipe book for mayhem, or a compendium of lessons learned by others. It depends on your situation.
PHP programmers will take issue with the authors’ blanket assessment of their language (”PHP is a study in bad security”), much of which seems based on older versions of the language that had some risky default behaviors–but those programmers will also double-check their servers’ register_globals settings. Users of insufficiently patched Microsoft and Oracle products will worry about the detailed attack instructions this book contains. Responsible programmers and administrators will appreciate what amounts to documentation of attackers’ rootkits for various operating systems, and will raise their eyebrows at the techniques for writing malicious code to unused EEPROM chips in target systems. –David Wall

Topics covered: How to make software fail, either by doing something it wasn’t designed to do, or by denying its use to its rightful users. Techniques–including reverse engineering, buffer overflow, and particularly provision of unexpected input–are covered along with the tools needed to carry them out. A section on hardware viruses is detailed and frightening.
http://rapidshare.com/files/145477603/Exploiting_Software_How_to_Break_Code.pdf

Dictionary of Computing September 15, 2008

Posted by reversengineering in E-BOOK.
add a comment

Dictionary of Computing

Simon Collin, “Dictionary of Computing”
Bloomsbury Reference l PDF l 385 Pages l 5 MB

Book Description :

The more than 10,000 entries in this computer reference provide comprehensive coverage of computer terms, including those related to hardware and software applications, programming languages, networks and communications, the Internet, and e-commerce. Quotations from computer magazines and newspapers offer examples of usage in this updated edition.

DownloadLink: http://rapidshare.com/files/145481220/dictionary_of_computing.rar

using softice September 15, 2008

Posted by reversengineering in E-BOOK.
add a comment

http://letitbit.net/download/716607626683/usingice.pdf.html

'Hacking' 카테고리의 다른 글

maxmind.com : anti proxy , block proxy users  (0) 2009.01.30
How to block Proxy Servers  (0) 2009.01.29
Debugger  (0) 2009.01.28
Wark/WPE  (0) 2009.01.27
Ollydbg Nonameo Bookmarks Plugins  (0) 2009.01.27
Posted by CEOinIRVINE
l