v

您的位置:VeryCD教育计算机


《逆向工程资源》(Reverse Engineering)

  • 状态: 精华资源
  • 摘要:
    发行日期2005年
    对白语言英语
  • 时间: 2005/11/01 23:50:48 发布 | 2007/08/09 08:03:32 更新
  • 分类: 教育  计算机 

Leonardo Da Vinci

精华资源: 6

全部资源: 10

相关: 分享到新浪微博   转播到腾讯微博   分享到开心网   分享到人人   分享到QQ空间   订阅本资源RSS更新   美味书签  subtitle
该内容尚未提供权利证明,无法提供下载。
中文名逆向工程资源
英文名Reverse Engineering
发行日期2005年
地区美国
对白语言英语
简介

IPB Image
注该系列为英文版, 内网做种。
已通过安全检测:
安全检测软件软件:Symante Antivirus 企业版
版本号:8.1.0.821
病毒库日期:2005-10-26 rev .7
长驻 Razorback 2.0 7*24小时开机


这次发点关于逆向工程的资源, 有兴趣的朋友可以一起讨论讨论 tongue.gif
工具包里有些东西我也没用过 所以请不要问我怎么用 smile.gif

反向工程:
软件的“反向工程”,或称“逆向工程”,是指对软件的结构、流程、算法、代码等进行逆向拆解和分析。在原创者不愿公布硬件或软件产品的上述技术特征的情况下,竞争者可以利用“反向工程”进行仿制生产,而配套产品生产者则也希望通过“反向工程”生产出在技术上与原产品兼容的设备。由于“反向工程”可导致原产品的核心技术被他人知晓,因此掌握先进技术的软件开发者往往需要在其产品中加入防止“反向工程”的技术措施。

In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in detail the five most important disciplines for security professionals and software developers: Coding, Sockets, Shellcode, Porting Applications, and Coding Security Tools.

"Read every page of this book, understand the content, and use it to your advantage."--Stuart McClure


Download the CodeAll code lines throughout the book are numbered for easy reference and are available for download from www.syngress.com/solutions.

Develop ShellcodeCustomize and optimize never-before-seen shellcode that can exploit almost any system.

Port Public ExploitsFollow step-by-step instructions for porting exploits to work on Windows, Linux, UNIX, and even Macs!

Customize Windows COM ObjectsWrap and automate pre-compiled exploits and security tools such as Nmap, netcat, and hping.

Enhance NiktoDevelop customized code to dramatically improve the performance of the Nikto Web server scanner.

Reverse Engineer Zero DaysLearn to reverse engineer, modify, and re-automate Zero-Day exploit code.

Write NASL ScriptsDevelop scripts for Nessus to discover the latest vulnerabilities.

Identify and Target VulnerabilitiesExamine case studies that reveal how attackers identify and exploit security holes.

Master SocketsDetailed code examples demonstrate socket initialization, closing sockets, reading and writing data.
Your Solutions Membership Gives You Access to:

A comprehensive FAQ page that consolidates all of the key points of this book into an easy-to-search Web page

"From the Author" Forum where the authors post timely updates and links to related sites

The complete code listings from the book

Downloadable chapters from these best-selling books:

Buffer Overflow Attacks: Detect, Exploit, Prevent

Programmer's Ultimate Security DeskRef

Hacking the Code: ASP.NET Web Application Security

Nessus Network Auditing

IPB Image

Book Description
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.
* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products
* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware
* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language


Tool Pack
- System Tools
Windows system variables
Scripting tool kit
Registry Patches Creator
Registry Docs
Reg& REGINI
Reg-Cracking-Engine
MCI doc
Elevate permission application launcher
Dos Batch Programming Guide
CMD Tools
CMD Basic Help

- Other Tools
WinCRC32
Sysinternals process explorer
Systinternals ntregmon
Systinternals ntfilmon
Setup Builder
Scooter Beyond Compare
Rar 3.2 command Line
Install Rite
Evidence Mini HTML Browser
Advance Crc Utility
7 Zip 2.3

- DIZ, Info, Txt Tools
txt2exe
terminal fonts
legacy file
flyingcode NFO viewer
eminence NFO viewer
elton's NFO

- Cracking Tools
WinHEX
W32Dasm
stup_PE
SoftICE
revirgin
ProcDump32
PE Explorer
Patch Maker
IDA to SoftICE symbol loader
FCTR UFX GUI
Datarescue IDA PRO

正在读取……

这里是其它用户补充的资源(我也要补充):

暂无补充资源
正在加载,请稍等...

点击查看所有32网友评论

 

(?) [公告]留口水、评论相关规则 | [活动]每日签到 轻松领取电驴经验

    小贴士:
  1. 类似“顶”、“沙发”之类没有营养的文字,对勤劳贡献的楼主来说是令人沮丧的反馈信息。
  2. 提问之前请再仔细看一遍楼主的说明,或许是您遗漏了。
  3. 勿催片。请相信驴友们对分享是富有激情的,如果确有更新版本,您一定能搜索到。
  4. 请勿到处挖坑绊人、招贴广告。既占空间让人厌烦,又没人会搭理,于人于己都无利。
  5. 如果您发现自己的评论不见了,请参考以上4条。