Implementing Reverse Engineering

  • Format:

The book ‘Implementing Reverse Engineering’ begins with a step-by-step explanation of the fundamentals of reverse engineering. You will learn how to use reverse engineering to find bugs and hacks in real-world applications. This book is divided into three sections. The first section is an exploration of the reverse engineering process. The second section explains reverse engineering of applications, and the third section is a collection of real-world use-cases with solutions. \nThe first section introduces the basic concepts of a computing system and the data building blocks of the computing system. This section also includes open-source tools such as CFF Explorer, Ghidra, Cutter, and x32dbg. The second section goes over various reverse engineering practicals on various applications to give users hands-on experience. In the third section, reverse engineering of Wannacry ransomware, a well-known Windows application, and various exercises are demonstrated step by step. \nIn a very detailed and step-by-step manner, you will practice and understand different assembly instructions, types of code calling conventions, assembly patterns of applications with the printf function, pointers, array, structure, scanf, strcpy function, decision, and loop control structures. You will learn how to use open-source tools for reverse engineering such as portable executable editors, disassemblers, and debuggers.

Jitender Narula is an experienced Cyber Security Specialist currently associated with the International Institute of Cyber Security (www.iicybersecurity.com) having 18+ years of industry experience. He has many years of cybersecurity experience with the government and the corporate world. In India, he has worked for law enforcement agencies (LEA), government entities like Delhi Police, ICAI (Institute of Chartered Accountants of India), Delhi University, and private organizations. He has worked on the projects of AT&T, Citrix, Google, Conexant, IPolicy Networks (Tech Mahindra now), Narus (a wholly-owned subsidiary of The Boeing Company), and HFCL. Apart from this, he has conducted training programs for various corporations and government officials in India, Mexico. He publishes articles, research documents, and interviews in the area of cybersecurity on Information Security Newspaper (www.securitynewspaper.com), Noticias de Seguridad inform?tica (noticiasseguridad.com), Cibertip - Noticias de Hacking (www.cibertip.com), Exploit One (www.exploitone.com), iicybersecurity blog (https://www.iicybersecurity.com/blog-eng.html) and also contributed to the Vishvas News, which is part of Dainik Jagran (Indian language daily newspaper)

Jitendra Narula

Customer questions & answers

Add a review

Login to write a review.

Related products

Subscribe to Padhega India Newsletter!

Step into a world of stories, offers, and exclusive book buzz- right in your inbox! ✨

Subscribe to our newsletter today and never miss out on the magic of books, special deals, and insider updates. Let’s keep your reading journey inspired! 🌟