Escucha y lee

Descubre un mundo infinito de historias

  • Lee y escucha todo lo que quieras
  • Más de 500 000 títulos
  • Títulos exclusivos + Storytel Originals
  • 14 días de prueba gratis, luego $24,900 COP/al mes
  • Cancela cuando quieras
Descarga la app
CO -Device Banner Block 894x1036

Binary Analysis Cookbook: Actionable recipes for disassembling and analyzing binaries for security risks

Idioma
Inglés
Format
Categoría

No ficción

Explore open-source Linux tools and advanced binary analysis techniques to analyze malware, identify vulnerabilities in code, and mitigate information security risks

Key Features

• Adopt a methodological approach to binary ELF analysis on Linux

• Learn how to disassemble binaries and understand disassembled code

• Discover how and when to patch a malicious binary during analysis

Book Description

Binary analysis is the process of examining a binary program to determine information security actions. It is a complex, constantly evolving, and challenging topic that crosses over into several domains of information technology and security.

This binary analysis book is designed to help you get started with the basics, before gradually advancing to challenging topics. Using a recipe-based approach, this book guides you through building a lab of virtual machines and installing tools to analyze binaries effectively. You'll begin by learning about the IA32 and ELF32 as well as IA64 and ELF64 specifications. The book will then guide you in developing a methodology and exploring a variety of tools for Linux binary analysis. As you advance, you'll learn how to analyze malicious 32-bit and 64-bit binaries and identify vulnerabilities. You'll even examine obfuscation and anti-analysis techniques, analyze polymorphed malicious binaries, and get a high-level overview of dynamic taint analysis and binary instrumentation concepts.

By the end of the book, you'll have gained comprehensive insights into binary analysis concepts and have developed the foundational skills to confidently delve into the realm of binary analysis.

What you will learn

• Traverse the IA32, IA64, and ELF specifications

• Explore Linux tools to disassemble ELF binaries

• Identify vulnerabilities in 32-bit and 64-bit binaries

• Discover actionable solutions to overcome the limitations in analyzing ELF binaries

• Interpret the output of Linux tools to identify security risks in binaries

• Understand how dynamic taint analysis works

Who this book is for

This book is for anyone looking to learn how to dissect ELF binaries using open-source tools available in Linux. If you're a Linux system administrator or information security professional, you'll find this guide useful. Basic knowledge of Linux, familiarity with virtualization technologies and the working of network sockets, and experience in basic Python or Bash scripting will assist you with understanding the concepts in this book

© 2019 Packt Publishing (eBook ): 9781789809497

Fecha de lanzamiento

eBook : 20 de septiembre de 2019

Etiquetas

    Otros también disfrutaron ...

    1. Cybersecurity For Dummies Joseph Steinberg
    2. HACKING: 3 BOOKS IN 1 Alex Wagner
    3. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
    4. Docker Essentials: Simplifying containerization : A Beginner's Guide Mike Wilson
    5. Security Chaos Engineering: Sustaining Resilience in Software and Systems Aaron Rinehart
    6. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
    7. Cloud Security For Dummies Ted Coombs
    8. Blockchain Basics: A Non-Technical Introduction in 25 Steps Daniel Drescher
    9. Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Test Peter Bradley
    10. Linux for Beginners: 3 BOOKS IN 1 ATTILA KOVACS
    11. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
    12. Ultimate Penetration Testing with Nmap Travis DeForge
    13. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
    14. Infrastructure Attack Strategies for Ethical Hacking Himanshu Sharma
    15. Ultimate Kali Linux Book, Second Edition: Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire Gllen D. Singh
    16. Defensive Security Handbook: Best Practices for Securing Infrastructure (2nd Edition) Amanda Berlin
    17. Practical Cloud Security: A Guide for Secure Design and Deployment (2nd Edition) Chris Dotson
    18. Hacking: A Quick and Simple Introduction to the Basics of Hacking, Scripting, Cybersecurity, Networking, and System Penetration Hans Weber
    19. Hacking API: Navigating the Intricacies of API Security and Ethical Hacking James Ferry
    20. The DevSecOps Playbook: Deliver Continuous Security at Speed Sean D. Mack
    21. Computer Programming and Cybersecurity for Beginners: All You Need to Know to Get Started with Python for Data Science, Excel and Ethical Hacking Kevin Clark
    22. Hacking: The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Kevin Clark
    23. The Surveillance State: Big Data, Freedom, and You The Great Courses
    24. The Linux Command Line Beginner's Guide Jonathan Moeller
    25. How to Make Stress Work for You The Great Courses
    26. The Brain-Based Guide to Communicating Better The Great Courses
    27. Taking Control of Your Personal Data The Great Courses
    28. Theories of Knowledge: How to Think about What You Know The Great Courses
    29. Cryptography: A Very Short Introduction Sean Murphy
    30. The Evidence for Modern Physics: How We Know What We Know Don Lincoln
    31. Great Ideas of Classical Physics The Great Courses
    32. Mastering Active Directory - Third Edition: Design, deploy, and protect Active Directory Domain Services for Windows Server 2022 Dishan Francis
    33. Distrust: Big Data, Data-Torturing, and the Assault on Science Gary Smith
    34. Coding for Beginners Using Python: A HANDS-ON, PROJECT-BASED INTRODUCTION TO LEARN CODING WITH PYTHON MARK MATTHES AND ERIC LUTZ
    35. Python: - The Bible- 3 Manuscripts in 1 book: Python Programming for Beginners - Python Programming for Intermediates - Python Programming for Advanced Maurice J. Thompson
    36. Google Cloud Cookbook: Practical Solutions for Building and Deploying Cloud Services, 1st Edition Rui Costa
    37. How to Take Smart Notes: One Simple Technique to Boost Writing, Learning and Thinking. 2nd Edition Sönke Ahrens
    38. The Software Developer's Career Handbook: A Guide to Navigating the Unpredictable Michael Lopp
    39. Coders at Work: Reflections on the Craft of Programming Peter Seibel
    40. Alice and Bob Learn Application Security Tanya Janca
    41. CompTIA A+ Certification Study Guide for 220-1102 Exam: Beginners guide to Operating Systems & Software Troubleshooting Richie Miller
    42. Building Microservices: Designing Fine-Grained Systems Sam Newman
    43. Fundamentals of Software Architecture: An Engineering Approach Neal Ford
    44. Programming Interviews For Dummies Eric Butow