Muutke küpsiste eelistusi

Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and systems [Pehme köide]

  • Formaat: Paperback / softback, 322 pages, kõrgus x laius: 235x191 mm
  • Ilmumisaeg: 08-Jan-2021
  • Kirjastus: Packt Publishing Limited
  • ISBN-10: 1800207972
  • ISBN-13: 9781800207974
Teised raamatud teemal:
  • Formaat: Paperback / softback, 322 pages, kõrgus x laius: 235x191 mm
  • Ilmumisaeg: 08-Jan-2021
  • Kirjastus: Packt Publishing Limited
  • ISBN-10: 1800207972
  • ISBN-13: 9781800207974
Teised raamatud teemal:
Detect potentials bugs in your code or program and develop your own tools using the Ghidra reverse engineering framework developed by the NSA project

Key Features

Make the most of Ghidra on different platforms such as Linux, Windows, and macOS Leverage a variety of plug-ins and extensions to perform disassembly, assembly, decompilation, and scripting Discover how you can meet your cybersecurity needs by creating custom patches and tools

Book DescriptionGhidra, an open source software reverse engineering (SRE) framework created by the NSA research directorate, enables users to analyze compiled code on any platform, whether Linux, Windows, or macOS. This book is a starting point for developers interested in leveraging Ghidra to create patches and extend tool capabilities to meet their cybersecurity needs. You'll begin by installing Ghidra and exploring its features, and gradually learn how to automate reverse engineering tasks using Ghidra plug-ins. Youll then see how to set up an environment to perform malware analysis using Ghidra and how to use it in the headless mode. As you progress, youll use Ghidra scripting to automate the task of identifying vulnerabilities in executable binaries. The book also covers advanced topics such as developing Ghidra plug-ins, developing your own GUI, incorporating new process architectures if needed, and contributing to the Ghidra project. By the end of this Ghidra book, youll have developed the skills you need to harness the power of Ghidra for analyzing and avoiding potential vulnerabilities in code and networks.What you will learn

Get to grips with using Ghidra's features, plug-ins, and extensions Understand how you can contribute to Ghidra Focus on reverse engineering malware and perform binary auditing Automate reverse engineering tasks with Ghidra plug-ins Become well-versed with developing your own Ghidra extensions, scripts, and features Automate the task of looking for vulnerabilities in executable binaries using Ghidra scripting Find out how to use Ghidra in the headless mode

Who this book is forThis SRE book is for developers, software engineers, or any IT professional with some understanding of cybersecurity essentials. Prior knowledge of Java or Python, along with experience in programming or developing applications, is required before getting started with this book.
Table of Contents

Getting Started with Ghidra
Automating RE Tasks with Ghidra Scripts
Ghidra Debug Mode
Using Ghidra Extensions
Reversing Malware Using Ghidra
Scripting Malware Analysis
Using Ghidra Headless Analyzer
Auditing Program Binaries
Scripting Binary Audits
Developing Ghidra Plugins
Incorporating New Binary Formats
Analyzing Processor Modules
Contributing to the Ghidra Community
Extending Ghidra for Advanced Reverse Engineering
David Álvarez Pérez is a senior malware analyst and reverse engineer. He has more than 12 years of experience in IT, having worked on his own antivirus product, and later as a malware analyst. He started working for a company that mostly reverse-engineered banking malware, and he helped to automate the process. After that, he joined the critical malware department of an antivirus company and then moved to a Galician research center, while doing his malware-related PhD at the University of Vigo. He has also hunted vulnerabilities in software products like Microsoft's Windows 10 and the National Security Agency's Ghidra project. David is currently working as a senior malware analyst at Gen Digital Inc.