By ΠΠ½Π΄ΡΠΈΠ΅ΡΡ ΠΡΠ½Π½ΠΈΡ
ΠΡΠ½Π½ΠΈΡ ΠΠ½Π΄ΡΠΈΠ΅ΡΡ, 2022
Π‘ΠΎΠ²ΡΠ΅ΠΌΠ΅Π½Π½ΡΠ΅ Π²ΡΠ΅Π΄ΠΎΠ½ΠΎΡΠ½ΡΠ΅ ΠΏΡΠΎΠ³ΡΠ°ΠΌΠΌΡ ΡΠ°ΡΡΠΎ ΠΈΡΠΏΠΎΠ»ΡΠ·ΡΡΡ ΠΎΠ±ΡΡΡΠΊΠ°ΡΠΈΡ Π΄Π»Ρ ΡΠΎΠΊΡΡΡΠΈΡ ΡΠ²ΠΎΠ΅ΠΉ ΠΈΡΡΠΈΠ½Π½ΠΎΠΉ ΠΏΡΠΈΡΠΎΠ΄Ρ. ΠΡΠ° ΠΊΠ½ΠΈΠ³Π° ΠΏΡΠ΅Π΄Π»Π°Π³Π°Π΅Ρ ΠΌΠ΅ΡΠΎΠ΄Ρ Π΄Π²ΠΎΠΈΡΠ½ΠΎΠ³ΠΎ Π°Π½Π°Π»ΠΈΠ·Π° Π΄Π»Ρ ΡΠ°ΡΠΊΡΡΡΠΈΡ ΡΠ²ΠΎΠΉΡΡΠ² ΠΈ ΡΡΠ½ΠΊΡΠΈΠΎΠ½Π°Π»ΡΠ½ΠΎΡΡΠΈ ΠΈΡΠΏΠΎΠ»Π½ΡΠ΅ΠΌΡΡ ΡΠ°ΠΉΠ»ΠΎΠ². ΠΡ ΠΈΠ·ΡΡΠΈΡΠ΅ Π±Π°Π·ΠΎΠ²ΡΠ΅ ΠΊΠΎΠ½ΡΠ΅ΠΏΡΠΈΠΈ, ΡΠΎΡΠΌΠ°ΡΡ Π΄Π²ΠΎΠΈΡΠ½ΡΡ ΡΠ°ΠΉΠ»ΠΎΠ² ΠΈ ΠΏΡΠΈΠΌΠ΅Π½ΠΈΡΠ΅ Π½Π°Π±ΠΎΡ ΠΈΠ½ΡΡΡΡΠΌΠ΅Π½ΡΠΎΠ² GNU/Linux binutils Π΄Π»Ρ Π°Π½Π°Π»ΠΈΠ·Π°. Π’Π°ΠΊΠΆΠ΅ Π±ΡΠ΄Π΅Ρ ΡΠ°ΡΡΠΌΠΎΡΡΠ΅Π½ΠΎ Π²Π½Π΅Π΄ΡΠ΅Π½ΠΈΠ΅ ΠΊΠΎΠ΄Π° ΠΈ ΡΠΎΠ·Π΄Π°Π½ΠΈΠ΅ ΠΈΠ½ΡΡΡΡΠΌΠ΅Π½ΡΠΎΠ² Π΄Π»Ρ ΠΏΡΠΎΡΠΈΠ»ΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΠΈ Π΄ΠΈΠ½Π°ΠΌΠΈΡΠ΅ΡΠΊΠΎΠ³ΠΎ Π°Π½Π°Π»ΠΈΠ·Π°.
Dennis Andriesse, 2022
As modern malware becomes increasingly obfuscated, sophisticated methods are needed to understand its true behavior. Binary analysis provides a way to uncover the properties and functionality of executable files. This book delves into binary analysis and instrumentation, starting with fundamental concepts and file formats. You will learn to use GNU/Linux binutils, perform disassembly, and implement code injection techniques. The text also covers creating profiling tools with Pin and developing dynamic taint analysis tools with libdft.