Home Page Icon
Home Page
Table of Contents for
Binary Analysis Cookbook
Close
Binary Analysis Cookbook
by Michael Born
Binary Analysis Cookbook
Title Page
Copyright and Credits
Binary Analysis Cookbook
Dedication
About Packt
Why subscribe?
Contributors
About the author
About the reviewer
Packt is searching for authors like you
Preface
Who this book is for
What this book covers
To get the most out of this book
Download the example code files
Download the color images
Conventions used
Sections
Getting ready
How to do it…
How it works…
There's more…
See also
Get in touch
Reviews
Setting Up the Lab
Installing VirtualBox on Windows
Getting ready
How to do it...
How it works...
There's more...
See also
Installing VirtualBox on Mac
Getting ready
How to do it...
How it works...
There's more...
See also
Installing VirtualBox on Ubuntu
Getting ready
How to do it...
How it works...
There's more...
See also
Installing a 32-bit Ubuntu 16.04 LTS Desktop virtual machine
Getting ready
How to do it...
How it works...
There's more...
See also
Installing a 64-bit Ubuntu 16.04 LTS Desktop virtual machine
Getting ready
How to do it...
How it works...
There's more...
See also
Installing the dependencies and the tools
Getting ready
How to do it...
How it works...
There's more...
See also
Installing the code examples
Getting ready
How to do it...
How it works...
There's more...
See also
Installing the EDB Debugger
Getting ready
How to do it...
How it works...
There's more...
See also
Taking a snapshot of the virtual machines
Getting ready
How to do it...
How it works...
There's more...
See also
32-bit Assembly on Linux and the ELF Specification
Technical requirements
Differences between Intel and AT&T syntax
Getting ready
How to do it...
How it works...
There's more...
See also
Introduction to the IA-32 registers
Getting ready
How to do it...
How it works...
There's more...
See also
Introducing common IA-32 instructions
Getting ready
How to do it...
How it works...
There's more...
See also
Making IA-32 system calls on Linux
Getting ready
How to do it...
How it works...
There's more...
See also
Introducing the ELF 32-bit specification
Getting ready
How to do it...
How it works...
There's more...
See also
64-bit Assembly on Linux and the ELF Specification
Technical requirements
Introducing the IA64 registers
Getting ready
How to do it...
How it works...
There's more...
See also
Introducing common IA64 instructions
Getting ready
How to do it...
How it works...
There's more...
See also
Making IA64 system calls on Linux
Getting ready
How to do it...
How it works...
There's more...
See also
Introducing the ELF 64-bit specification
Getting ready
How to do it...
How it works...
There's more...
See also
Creating a Binary Analysis Methodology
Technical requirements
Performing binary discovery
Getting ready
How to do it...
How it works...
There's more...
See also
Information gathering
Getting ready
How to do it...
How it works...
There's more...
See also
Static analysis
Getting ready
How to do it...
How it works...
There's more...
See also
Dynamic analysis
Getting ready
How to do it...
How it works...
There's more...
See also
Iterating each step
Getting ready
How to do it...
How it works...
There's more...
See also
Automating methodology tasks
Getting ready
How to do it...
How it works...
There's more...
See also
Adapting the methodology steps
Getting ready
How to do it...
How it works...
There's more...
See also
Linux Tools for Binary Analysis
Technical requirements
Using file
Getting ready
How to do it...
How it works...
There's more...
See also
Using strings
Getting ready
How to do it...
How it works...
There's more...
See also
Using readelf
Getting ready
How to do it...
How it works...
There's more...
See also
Using nm
Getting ready
How to do it...
How it works...
There's more...
See also
Using objcopy
Getting ready
How to do it...
How it works...
There's more...
See also
Using objdump
Getting ready
How to do it...
How it works...
There's more...
See also
Using ltrace and strace
Getting ready
How to do it...
How it works...
There's more...
See also
Using data duplicator (dd)
Getting ready
How to do it...
How it works...
There's more...
See also
Using the GNU Debugger (GDB)
Getting ready
How to do it...
How it works...
There's more...
See also
Using Evan's Debugger (EDB)
Getting ready
How to do it...
How it works...
There's more...
See also
Analyzing a Simple Bind Shell
Technical requirements
Performing discovery
Getting ready
How to do it...
How it works...
There's more...
See also
Gathering information
Getting ready
How to do it...
How it works...
There's more...
See also
Performing static analysis
Getting ready
How to do it...
How it works...
There's more...
See also
Using ltrace and strace
Getting ready
How to do it...
How it works...
There's more...
See also
Using GDB for dynamic analysis
Getting ready
How to do it...
How it works...
There's more...
See also
Finishing dynamic analysis
Getting ready
How to do it...
How it works...
There's more...
See also
Analyzing a Simple Reverse Shell
Technical requirements
Automating the initial phases
Getting ready
How to do it...
How it works...
There's more...
See also
Static analysis with objdump
Getting ready
How to do it...
How it works...
There's more...
See also
Editing the binary
Getting ready
How to do it...
How it works...
There's more...
See also
Using GDB TUI mode
Getting ready
How to do it...
How it works...
There's more...
See also
Continuing with dynamic analysis
Getting ready
How to do it...
How it works...
There's more...
See also
Analyzing the execve system call
Getting ready
How to do it...
How it works...
There's more...
See also
Identifying Vulnerabilities
Technical requirements
Automating the initial phases
Getting ready
How to do it...
How it works...
There's more...
See also
Extended static analysis
Getting ready
How to do it...
How it works...
There's more...
See also
Identifying hard coded credentials with ltrace
Getting ready
How to do it...
How it works...
There's more...
See also
Identifying hard coded credentials with a debugger
Getting ready
How to do it...
How it works...
There's more...
See also
Validating a stack-based buffer overflow
Getting ready
How to do it...
How it works...
There's more...
See also
Understanding Anti-Analysis Techniques
Technical requirements
Understanding signature detection
Getting ready
How to do it...
How it works...
There's more...
See also
Changing a binary's signature
Getting ready
How to do it...
How it works...
There's more...
See also
Confusing static analysis tools
Getting ready
How to do it...
How it works...
There's more...
See also
Encoding and decoding
Getting ready
How to do it...
How it works...
There's more...
See also
A Simple Reverse Shell With Polymorphism
Technical requirements
Automating the initial phases
Getting ready
How to do it...
How it works...
There's more...
See also
Performing static analysis
Getting ready
How to do it...
How it works...
There's more...
See also
Using EDB for dynamic analysis
Getting ready
How to do it...
How it works...
There's more...
See also
Analyzing deobfuscation loops
Getting ready
How to do it...
How it works...
There's more...
See also
Wrapping up dynamic analysis
Getting ready
How to do it...
How it works...
There's more...
See also
Another Book You May Enjoy
Leave a review - let other readers know what you think
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Title Page
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset