

Worth: $33.74
(as of Dec 11, 2025 22:30:47 UTC – Particulars)
Extra sensible much less idea
Key Options
● In-depth sensible demonstration with a number of examples of reverse engineering ideas.
● Supplies a step-by-step method to reverse engineering, together with meeting directions.
● Reverse engineering methods for simple-to-complex purposes like Wannacry ransomware and Home windows calculator.
Description
The ebook ‘Implementing Reverse Engineering’ begins with a step-by-step rationalization of the basics of reverse engineering. You’ll learn to use reverse engineering to search out bugs and hacks in real-world purposes. This ebook is split into three sections. The primary part is an exploration of the reverse engineering course of. The second part explains reverse engineering of purposes, and the third part is a group of real-world use-cases with options.
The primary part introduces the essential ideas of a computing system and the info constructing blocks of the computing system. This part additionally contains open-source instruments akin to CFF Explorer, Ghidra, Cutter, and x32dbg. The second part goes over varied reverse engineering practicals on varied purposes to offer customers hands-on expertise.
What you’ll be taught
● Perceive totally different code calling conventions like CDECL, STDCALL, and FASTCALL with sensible illustrations.
● Analyze and break WannaCry ransomware utilizing Ghidra.
● Hack the Home windows calculator to change its conduct.
Who this ebook is for
This ebook is for cybersecurity researchers, bug bounty hunters, software program builders, software program testers, and software program high quality assurance specialists who wish to carry out reverse engineering for superior safety from assaults. readers will also be from excessive colleges or universities (with a Laptop Science background).
Desk of Contents
1. Affect of Reverse Engineering
2. Understanding Structure of x86 machines
3. Up and Working with Reverse Engineering instruments
4. Walkthrough on Meeting Directions
5. Sorts of Code Calling Conventions
6. Reverse Engineering Sample of Fundamental Code
7. Reverse Engineering Sample of the printf() Program
8. Reverse Engineering Sample of the Pointer Program
9. Reverse Engineering Sample of the Resolution Management Construction
10. Reverse Engineering Sample of the Loop Management Construction
11. Array Code Sample in Reverse Engineering
12. Construction Code Sample in Reverse Engineering
13. Scanf Program Sample in Reverse Engineering
14. Strcpy Program Sample in Reverse Engineering
15. Easy Curiosity Code Sample in Reverse Engineering
16. Breaking Wannacry Ransomware with Reverse Engineering
17. Generate Pseudo Code from the Binary File
18. Enjoyable with Home windows Calculator Utilizing Reverse Engineering
Concerning the Authors
Jitender Narula is an skilled Cyber Safety Specialist at the moment related to the Worldwide Institute of Cyber Safety (www.iicybersecurity.com) having 18+ years of trade expertise. He has a few years of cybersecurity expertise with the federal government and the company world. In India, he has labored for regulation enforcement businesses (LEA), authorities entities like Delhi Police, ICAI (Institute of Chartered Accountants of India), Delhi College, and personal organizations.
LinkedIn Profile: https://in.linkedin.com/in/jitender-narula-7146123
Weblog Hyperlink:https://www.securitynewspaper.com/2020/04/24/employee-data-leaked-apple-google-microsoftlinkedin-intel-cisco-verizon-oracle-hp-nvidia-affected/
Writer : BPB Publications
Publication date : Aug. 28 2021
Language : English
Print size : 494 pages
ISBN-10 : 9391030378
ISBN-13 : 978-9391030377
Merchandise weight : 780 g
Dimensions : 19.05 x 2.84 x 23.5 cm
Greatest Sellers Rank: #1,576,516 in Books (See High 100 in Books) #79 in Meeting Language Programming (Books) #175 in Laptop Viruses #484 in Hacking
Buyer Critiques: 4.0 4.0 out of 5 stars (20) var dpAcrHasRegisteredArcLinkClickAction; P.when(‘A’, ‘prepared’).execute(operate(A) { if (dpAcrHasRegisteredArcLinkClickAction !== true) { dpAcrHasRegisteredArcLinkClickAction = true; A.declarative( ‘acrLink-click-metrics’, ‘click on’, { “allowLinkDefault”: true }, operate (occasion) { if (window.ue) } ); } }); P.when(‘A’, ‘cf’).execute(operate(A) { A.declarative(‘acrStarsLink-click-metrics’, ‘click on’, { “allowLinkDefault” : true }, operate(occasion){ if(window.ue) }); });


