did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781593272890

The Ida Pro Book

by
  • ISBN13:

    9781593272890

  • ISBN10:

    1593272898

  • Edition: 2nd
  • Format: Paperback
  • Copyright: 2011-07-11
  • Publisher: PENGUIN
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $69.95 Save up to $2.10
  • Buy New
    $67.85
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 3-5 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

IDA Pro is a commercial disassembler and debugger used by reverse engineers to dissect compiled computer programs, and is the industry standard tool for analysis of hostile code. The IDA Pro Book provides a comprehensive, top-down overview of IDA Pro and its use for reverse engineering software. Author Chris Eagle, a recognized expert in the field, takes readers from the basics of disassembly theory to the complexities of using IDA Pro in real-world situations. Topics are introduced in the order most frequently encountered, allowing experienced users to easily jump in at the most appropriate point. Eagle covers a variety of real-world reverse engineering challenges and offers strategies to deal with them, such as disassembly manipulation, graphing, and effective use of cross references. This second edition of The IDA Pro Book has been completely updated and revised to cover the new features and cross-platform interface of IDA Pro 6.0. Other additions include expanded coverage of the IDA Pro Debugger, IDAPython, and the IDA Pro SDK.

Author Biography

Chris Eagle is a Senior Lecturer of Computer Science at the Naval Postgraduate School in Monterey, CA. He is the author of many IDA plug-ins and co-author of Gray Hat Hacking, and he has spoken at numerous security conferences, including Black Hat, Defcon, ToorCon, and ShmooCon.

Table of Contents

Dedication
Acknowledgments
Introduction
Introduction to IDA
Introduction to Disassembly
Disassembly Theory
The What of Disassembly
The Why of Disassembly
The How of Disassembly
Summary
Reversing and Disassembly Tools
Classification Tools
Summary Tools
Deep Inspection Tools
Summary
IDA Pro Background
Hex-Rays' Stance on Piracy
Obtaining IDA Pro
IDA Support Resources
Your IDA Installation
Thoughts on IDA's User Interface
Summary; Basic IDA Usage
Getting Started with IDA
Launching IDA
IDA Database Files
Introduction to the IDA Desktop
Desktop Behavior During Initial Analysis
IDA Desktop Tips and Tricks
Reporting Bugs
Summary
IDA Data Displays
The Principal IDA Displays
Secondary IDA Displays
Tertiary IDA Displays
Summary
Disassembly Navigation
Basic IDA Navigation
Stack Frames
Searching the Database
Summary
Disassembly Manipulation
Names and Naming
Commenting in IDA
Basic Code Transformations
Basic Data Transformations
Summary
Datatypes and Data Structures
Recognizing Data Structure Use
Creating IDA Structures
Using Structure Templates
Importing New Structures
Using Standard Structures
IDA TIL Files
C++ Reversing Primer
Summary
Cross-References and Graphing
Cross-References
IDA Graphing
Summary
The Many Faces of IDA
Console Mode IDA
Using IDA's Batch Mode
Summary; Advanced IDA Usage
Customizing IDA
Configuration Files
Additional IDA Configuration Options
Summary
Library Recognition Using FLIRT Signatures
Fast Library Identification and Recognition Technology
Applying FLIRT Signatures
Creating FLIRT Signature Files
Summary
Extending IDA's Knowledge
Augmenting Function Information
Augmenting Predefined Comments with loadint
Summary
Patching Binaries and Other IDA Limitations
The Infamous Patch Program Menu
IDA Output Files and Patch Generation
Summary; Extending IDA's Capabilities
IDA Scripting
Basic Script Execution
The IDC Language
Associating IDC Scripts with Hotkeys
Useful IDC Functions
IDC Scripting Examples
IDAPython
IDAPython Scripting Examples
Summary
The IDA Software Development Kit
SDK Introduction
The IDA Application Programming Interface
Summary
The IDA Plug-in Architecture
Writing a Plug-in
Building Your Plug-ins
Installing Plug-ins
Configuring Plug-ins
Extending IDC
Plug-in User Interface Options
Scripted Plug-ins
Summary
Binary Files and IDA Loader Modules
Unknown File Analysis
Manually Loading a Windows PE File
IDA Loader Modules
Writing an IDA Loader Using the SDK
Alternative Loader Strategies
Writing a Scripted Loader
Summary
IDA Processor Modules
Python Byte Code
The Python Interpreter
Writing a Processor Module Using the SDK
Building Processor Modules
Customizing Existing Processors
Processor Module Architecture
Scripting a Processor Module
Summary; Real-World Applications
Compiler Personalities
Jump Tables and Switch Statements
RTTI Implementations
Locating main
Debug vs. Release Binaries
Alternative Calling Conventions
Summary
Obfuscated Code Analysis
Anti–Static Analysis Techniques
Anti–Dynamic Analysis Techniques
Static De-obfuscation of Binaries Using IDA
Virtual Machine-Based Obfuscation
Summary
Vulnerability Analysis
Discovering New Vulnerabilities with IDA
After-the-Fact Vulnerability Discovery with IDA
IDA and the Exploit-Development Process
Analyzing Shellcode
Summary
Real-World IDA Plug-ins
Hex-Rays
IDAPython
collabREate
ida-x86emu
Class Informer
MyNav
IdaPdf
Summary; The IDA Debugger
The IDA Debugger
Launching the Debugger
Basic Debuuuuuugger Displays
Process Control
Automating Debugger Tasks
Summary
Disassembler/Debugger Integration
Background
IDA Databases and the IDA Debugger
Debugging Obfuscated Code
IdaStealth
Dealing with Exceptions
Summary
Additional Debugger Features
Remote Debugging with IDA
Debugging with Bochs
Appcall
Summary; Using IDA Freeware 5.0
Restrictions on IDA Freeware
Using IDA Freeware; IDC/SDK Cross-Reference;
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program