5.7 C
Canada
Saturday, January 10, 2026
HomeTechnology and A.I ProductsImplementing Reverse Engineering: The Actual Observe of X86 Internals, Code Calling Conventions,...

Implementing Reverse Engineering: The Actual Observe of X86 Internals, Code Calling Conventions, Ransomware Decryption, Utility Cracking, Meeting Language, and Confirmed Cybersecurity Open Supply Instruments (English Version)


Worth: $33.74
(as of Dec 11, 2025 22:30:47 UTC – Particulars)


Extra sensible much less idea

Key Options

● In-depth sensible demonstration with a number of examples of reverse engineering ideas.

● Supplies a step-by-step method to reverse engineering, together with meeting directions.

● Reverse engineering methods for simple-to-complex purposes like Wannacry ransomware and Home windows calculator.

Description

The ebook ‘Implementing Reverse Engineering’ begins with a step-by-step rationalization of the basics of reverse engineering. You’ll learn to use reverse engineering to search out bugs and hacks in real-world purposes. This ebook is split into three sections. The primary part is an exploration of the reverse engineering course of. The second part explains reverse engineering of purposes, and the third part is a group of real-world use-cases with options.

The primary part introduces the essential ideas of a computing system and the info constructing blocks of the computing system. This part additionally contains open-source instruments akin to CFF Explorer, Ghidra, Cutter, and x32dbg. The second part goes over varied reverse engineering practicals on varied purposes to offer customers hands-on expertise.

What you’ll be taught

● Perceive totally different code calling conventions like CDECL, STDCALL, and FASTCALL with sensible illustrations.

● Analyze and break WannaCry ransomware utilizing Ghidra.

● Hack the Home windows calculator to change its conduct.

Who this ebook is for

This ebook is for cybersecurity researchers, bug bounty hunters, software program builders, software program testers, and software program high quality assurance specialists who wish to carry out reverse engineering for superior safety from assaults. readers will also be from excessive colleges or universities (with a Laptop Science background).

Desk of Contents

1. Affect of Reverse Engineering

2. Understanding Structure of x86 machines

3. Up and Working with Reverse Engineering instruments

4. Walkthrough on Meeting Directions

5. Sorts of Code Calling Conventions

6. Reverse Engineering Sample of Fundamental Code

7. Reverse Engineering Sample of the printf() Program

8. Reverse Engineering Sample of the Pointer Program

9. Reverse Engineering Sample of the Resolution Management Construction

10. Reverse Engineering Sample of the Loop Management Construction

11. Array Code Sample in Reverse Engineering

12. Construction Code Sample in Reverse Engineering

13. Scanf Program Sample in Reverse Engineering

14. Strcpy Program Sample in Reverse Engineering

15. Easy Curiosity Code Sample in Reverse Engineering

16. Breaking Wannacry Ransomware with Reverse Engineering

17. Generate Pseudo Code from the Binary File

18. Enjoyable with Home windows Calculator Utilizing Reverse Engineering

Concerning the Authors

Jitender Narula is an skilled Cyber Safety Specialist at the moment related to the Worldwide Institute of Cyber Safety (www.iicybersecurity.com) having 18+ years of trade expertise. He has a few years of cybersecurity expertise with the federal government and the company world. In India, he has labored for regulation enforcement businesses (LEA), authorities entities like Delhi Police, ICAI (Institute of Chartered Accountants of India), Delhi College, and personal organizations.

LinkedIn Profile: https://in.linkedin.com/in/jitender-narula-7146123

Weblog Hyperlink:https://www.securitynewspaper.com/2020/04/24/employee-data-leaked-apple-google-microsoftlinkedin-intel-cisco-verizon-oracle-hp-nvidia-affected/

Writer ‏ : ‎ BPB Publications
Publication date ‏ : ‎ Aug. 28 2021
Language ‏ : ‎ English
Print size ‏ : ‎ 494 pages
ISBN-10 ‏ : ‎ 9391030378
ISBN-13 ‏ : ‎ 978-9391030377
Merchandise weight ‏ : ‎ 780 g
Dimensions ‏ : ‎ 19.05 x 2.84 x 23.5 cm
Greatest Sellers Rank: #1,576,516 in Books (See High 100 in Books) #79 in Meeting Language Programming (Books) #175 in Laptop Viruses #484 in Hacking
Buyer Critiques: 4.0 4.0 out of 5 stars (20) var dpAcrHasRegisteredArcLinkClickAction; P.when(‘A’, ‘prepared’).execute(operate(A) { if (dpAcrHasRegisteredArcLinkClickAction !== true) { dpAcrHasRegisteredArcLinkClickAction = true; A.declarative( ‘acrLink-click-metrics’, ‘click on’, { “allowLinkDefault”: true }, operate (occasion) { if (window.ue) } ); } }); P.when(‘A’, ‘cf’).execute(operate(A) { A.declarative(‘acrStarsLink-click-metrics’, ‘click on’, { “allowLinkDefault” : true }, operate(occasion){ if(window.ue) }); });

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments