Ghidra Software Reverse-Engineering for Beginners - Second Edition

Ghidra Software Reverse-Engineering for Beginners - Second Edition

David Álvarez Pérez / Ravikant Tiwari

66,39 €
IVA incluido
Disponible
Editorial:
Packt Publishing
Año de edición:
2025
ISBN:
9781835889824
66,39 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Learn how to use Ghidra to analyze your code for potential vulnerabilities and examine both malware and network threatsKey Features:- Make the most of Ghidra on different platforms such as Linux, Windows, and macOS- Unlock the potential of plug-ins and extensions for disassembly, assembly, decompilation, and scripting- Learn advanced concepts like binary diffing, debugging, unpacking real-world malware samples, and reverse engineering ransomware- Purchase of the print or Kindle book includes a free PDF eBookBook Description:Written by David Álvarez Pérez, a senior malware analyst at Gen Digital Inc., and Ravikant Tiwari, a senior security researcher at Microsoft, with expertise in malware and threat detection, this book is a complete guide to using Ghidra for examining malware, making patches, and customizing its features for your cybersecurity needs.This updated edition walks you through implementing Ghidra’s capabilities and automating reverse-engineering tasks with its plugins. You’ll learn how to set up an environment for practical malware analysis, use Ghidra in headless mode, and leverage Ghidra scripting to automate vulnerability detection in executable binaries. Advanced topics such as creating Ghidra plugins, adding new binary formats, analyzing processor modules, and contributing to the Ghidra project are thoroughly covered too.This edition also simplifies complex concepts such as remote and kernel debugging and binary diffing, and their practical uses, especially in malware analysis. From unpacking malware to analyzing modern ransomware, you’ll acquire the skills necessary for handling real-world cybersecurity challenges.By the end of this Ghidra book, you’ll be adept at avoiding potential vulnerabilities in code, extending Ghidra for advanced reverse-engineering, and applying your skills to strengthen your cybersecurity strategies.What You Will Learn:- Develop and integrate your own Ghidra extensions- Discover how to use Ghidra in headless mode- Extend Ghidra for advanced reverse-engineering- Perform binary differencing for use cases such as patch and vulnerability analysis- Perform debugging locally and in a remote environment- Apply your skills to real-world malware analysis scenarios including ransomware analysis and unpacking malware- Automate vulnerability detection in executable binaries using Ghidra scriptingWho this book is for:This book is for software engineers, security researchers, and professionals working in software development and testing who want to deepen their expertise in reverse engineering and cybersecurity. Aspiring malware analysts and vulnerability researchers will also benefit greatly. Prior experience with Java or Python and a foundational understanding of programming is recommended.Table of Contents- Getting Started with Ghidra- Automating RE Tasks with Ghidra Scripts- Ghidra Debug Mode- Using Ghidra Extensions- Reversing Malware Using Ghidra- Scripting Malware Analysis- Using Ghidra’s Headless Analyzer- Binary Diffing- Auditing Program Binaries- Scripting Binary Audits- Developing Ghidra Plugins- Incorporating New Binary Formats- Analyzing Processor Modules- Contributing to the Ghidra Community- Extending Ghidra for Advanced Reverse-Engineering- Debugging- Unpacking in-the-Wild Malware- Reverse-Engineering Ransomware

Artículos relacionados

  • Privacy, Intrusion Detection and Response
    Peyman Kabiri
    Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, ...
  • Current Trends in Cyber Security
    Irina du Quenoy / Neil Kent
    This groundbreaking collection of essays assesses how cyber security affects our lives, businesses, and safety. The contributors -- all leaders in their fields -- have produced approach cyber security from multiple innovative angles. Business professor Matthew Cadbury takes a long view, studying earlier intelligence failures in the field of conventional conflict to identify pat...
  • TLS Cryptography In-Depth
    Dr. Paul Duplys / Dr. Roland Schmitz
    A practical introduction to modern cryptography using the Transport Layer Security protocol as the primary referenceKey Features- Learn about real-world cryptographic pitfalls and how to avoid them- Understand past attacks on TLS, how these attacks worked, and how they were fixed- Discover the inner workings of modern cryptography and its application within TLS- Purchase of the...
    Disponible

    75,87 €

  • The GPT-4 Crypto Revolution
    Zane Wilder
    Discover the power of AI in the crypto world, from Bitcoin’s disruptive emergence to GPT-4’s cutting-edge analysis. Find out how savvy investors conquer the digital currency frontier. Learn how AI can reshape risk, outsmart markets, and secure your crypto journey. AI Insights: Unravel market trends using GPT-4’s accurate predictions.Strategy Development: Forge robust strategies...
    Disponible

    20,26 €

  • Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms
    In an era of rapid technological advancements, blockchain technology has emerged as a groundbreaking solution for decentralized trust and immutable record-keeping. Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms delves into the intricate world of blockchain, offering a comprehensive exploration of its various dimensions. At its core, blockchain disrupts the ...
  • Innovative Machine Learning Applications for Cryptography
    Data security is paramount in our modern world, and the symbiotic relationship between machine learning and cryptography has recently taken center stage. The vulnerability of traditional cryptosystems to human error and evolving cyber threats is a pressing concern. The stakes are higher than ever, and the need for innovative solutions to safeguard sensitive information is unden...
    Disponible

    294,49 €