ida pro book 2nd

ida pro book 2nd

ID:14916293

大小:6.42 MB

页数:676页

时间:2018-07-31

ida pro book 2nd_第1页
ida pro book 2nd_第2页
ida pro book 2nd_第3页
ida pro book 2nd_第4页
ida pro book 2nd_第5页
资源描述:

《ida pro book 2nd》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库

1、E2DNIDTJIMOIDAPROEBPNIDAPROPBUDDEE--OOBBFFUUSSCCAATTEEDD2SNDEDITIONTTHHEEJMTTEBPPHHIDAPROBIDAPROUSEENosourcecode?Noproblem.WithIDAPro,theinter-Usecodegraphingtoquicklymakesenseofcross-activedisassembler,youliveinasourcecodeoptionalreferencesandfunctioncallsBOOKworld.IDAcanauto

2、maticallyanalyzethemillionsofIIBOOKExtendIDAtosupportnewprocessorsandfiletypesopcodesthatmakeupanexecutableandpresentyouDusingtheSDKDwithadisassembly.Butatthatpoint,yourworkisjustTHEUNOFFICIALGUIDETOTHEbeginning.WithTheIDAProBook,youlllearnhowExplorepopularplug-insthatmakewriti

3、ngIDAscriptsAAWORLD’SMOSTPOPULARDISASSEMBLERtoturnthatmountainofmnemonicsintosomethingyoueasier,allowcollaborativereverseengineering,andcanactuallyuse.muchmorePPHailedbythecreatorofIDAProasprofound,compre-UseIDAsbuilt-indebuggertotacklehostileandCHRISEAGLEhensive,andaccurate,t

4、hesecondeditionofTheIDAobfuscatedcodeProBookcoverseverythingfromtheveryfirststepstoRRWhetheryoureanalyzingmalware,conductingvulnerabil-advancedautomationtechniques.Youllfindcompleteityresearch,orreverseengineeringsoftware,amastery“IwholeheartedlyrecommendThecoverageofIDAsnewQt-b

5、aseduserinterface,asOofIDAProiscrucialtoyoursuccess.TakeyourskillstotheOIDAProBooktoallIDAProusers.”wellasincreasedcoverageoftheIDAdebugger,thenextlevelwiththis2ndeditionofTheIDAProBook.—IlfakGuilfanov,Bochsdebugger,andIDAscripting(especiallyusingIDAPython).Butbecausehumansare

6、stillsmarterthanABOUTTHEAUTHORBBcreatorofIDAProcomputers,youllevenlearnhowtouseIDAslatestChrisEagleisaSeniorLecturerofComputerScienceinteractiveandscriptableinterfacestoyouradvantage.attheNavalPostgraduateSchoolinMonterey,CA.OSavetimeandeffortasyoulearnto:OHeistheauthorofmanyI

7、DAplug-insandco-authorofNavigate,comment,andmodifydisassemblyGrayHatHacking(McGraw-Hill),andhehasspokenOOatnumeroussecurityconferences,includingBlackhat,Identifyknownlibraryroutines,soyoucanfocusyourDefcon,Toorcon,andShmoocon.analysisonotherareasofthecodeKKJMTHEFINESTINGEEKENT

8、ERTAINMENT™www.nostarch.comEAPGEBL$69.95($79.95CDN)E“ILIEFLAT

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。