Learning Linux Binary Analysis
English | ISBN: 1782167102 | 2016 | EPUB/MOBI/Code files (True) | 282 Pages | 4,1 MB
Key Features
Grasp the intricacies of the ELF binary format of UNIX and Linux
Design tools for reverse engineering and binary forensic analysis
Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes
Book Description
Learning Linux Binary Analysis is packed with knowledge and code that will teach you the inner workings of the ELF format, and the methods used by hackers and security analysts for virus analysis, binary patching, software protection and more.
This book will start by taking you through UNIX/Linux object utilities, and will move on to teaching you all about the ELF specimen. You will learn about process tracing, and will explore the different types of Linux and UNIX viruses, and how you can make use of ELF Virus Technology to deal with them.
The latter half of the book discusses the usage of Kprobe instrumentation for kernel hacking, code patching, and debugging. You will discover how to detect and disinfect kernel-mode rootkits, and move on to analyze static code. Finally, you will be walked through complex userspace memory infection analysis.
This book will lead you into territory that is uncharted even by some experts; right into the world of the computer hacker.
What you will learn
Explore the internal workings of the ELF binary format
Discover techniques for UNIX Virus infection and analysis
Work with binary hardening and software anti-tamper methods
Patch executables and process memory
Bypass anti-debugging measures used in malware
Perform advanced forensic analysis of binaries
Design ELF-related tools in the C language
Learn to operate on memory with ptrace
Download:
http://longfiles.com/05o7hew78p6f/Learning_Linux_Binary_Analysis.rar.html
[Fast Download] Learning Linux Binary Analysis
Linux Shell Scripting Cookbook
The Android Guidebook (2017)
bash Cookbook: Solutions and Examples for bash Users, 2nd Edition
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions
Linux Formats: 200 best ever Linux tips
Get Started with Ubuntu 15.10
Linux Server Security: Hack and Defend
Fedora Linux Man Files: User Commands (Volume 8)
Red Hat Linux Networking and System Administration
Ubuntu Server Cookbook
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Microsoft | Windows Software |
Unix Software | Mac Software |
Linux Formats: 200 best ever Linux tips(3093)
The Android Guidebook (2017)(2797)
Linux Shell Scripting Bootcamp(2697)
Mastering Embedded Linux Programming - Sec(2297)
Red Hat Enterprise Linux 7: Desktops and A(2057)
bash Cookbook: Solutions and Examples for (2039)
Kali Linux - An Ethical Hacker's Cookbook:(1948)
Continuous Delivery with Docker and Jenkin(1611)
Kali Linux - An Ethical Hacker's Cookbook:(1238)
CompTIA Linux+/LPIC-1: Training and Exam P(1167)
Security utility for Linux server(1050)
bash Cookbook: Solutions and Examples for (857)
Linux Shell Scripting Cookbook(838)
Using Ubuntu MATE and Its Applications(606)
NISTIR 8176 Security Assurance Requirement(367)
