- Häftad (Paperback / softback)
- Antal sidor
- No Starch Press,US
- 234 x 178 x 41 mm
- Antal komponenter
- 1158 g
Du kanske gillar
The Ghidra Book
A Definitive Guide477
The Ghidra Book teaches readers how to use Ghidra to answer the hardest problems about software behavior. It is a tutorial about Ghidra's features that includes examples and instructions on how to use and modify the open source software to make it meet the needs of any individual or organisation.
- Skickas inom 7-10 vardagar.
- Gratis frakt inom Sverige över 199 kr för privatpersoner.
Passar bra ihop
KundrecensionerHar du läst boken? Sätt ditt betyg »
Recensioner i media
"The Ghidra Book provides a thorough introduction for new users, using clear examples with plenty of background information . . . a valuable addition to the skill set of a malware analyst." -Max Kersten "The book takes you from the beginning of your Ghidra journey to the end. From an introduction to disassembly and working with the basics of Ghidra to scripting in Ghidra to extend its capabilities, this book covers it all. . . . a perfect 5/5 for me." -Tyler Reguly, Tripwire Book Club "I would highly recommend this book. Rather than simply being a Ghidra user guide, the authors did an exceptional job of laying out many of the fundamental concepts involved in software reverse engineering." -Craig Young, Principal Security Researcher, Tripwire "I enjoyed The Ghidra Book, and it was a good starting point for me in entering the world of reverse engineering and the many different tools that are accessible due to being open-sourced. I encourage anyone that has an interest in reverse engineering or who just wants to investigate cool open-sourced tools to give The Ghidra Book a read." -Matthew Jerzewski, Security Researcher, Tripwire
Chris Eagle has been reverse engineering software for 40 years. He is the author of The IDA Pro Book (No Starch Press) and is a highly sought-after provider of reverse engineering training. He has published numerous reverse engineering tools and given numerous talks at conferences such as Blackhat, Defcon, and Shmoocon. Dr. Kara Nance is a private security consultant. She has been a professor of computer science for many years. She has served on the Honeynet Project Board of Directors and has given numerous talks at conferences around the world. She enjoys building Ghidra extensions and regularly provides Ghidra training
Chapter 1: Introduction to Disassembly Chapter 2: Reversing and Disassembly Tools Chapter 3: Ghidra Background Chapter 4: Getting Started with Ghidra Chapter 5: CodeBrowser and Display Windows Chapter 6: Disassembly Navigation Chapter 7: Disassembly Manipulation Chapter 8: Data Types and Data Structures Chapter 9: Cross-References Chapter 10: Graphs Chapter 11: Collaborative SRE with Ghidra Chapter 12: Customizing Ghidra Chapter 13: Extending Ghidra Signatures Chapter 14: Basic Ghidra Scripting Chapter 15: Advanced Ghidra Scripting Chapter 16: Using Ghidra in Headless Mode Chapter 17: Unrecognized Binary Files Chapter 18: Processors Chapter 19: Compiler Variations Chapter 20: Obfuscated Code Analysis Chapter 21: Patching Binaries Chapter 22: Vulnerability Analysis Chapter 23: Binar Differencing and Version Tracking Appendix A: Ghidra for IDA Users Appendix B: C to assembly correspondence