Binary Analysis Cookbook (eBook)

Actionable recipes for disassembling and analyzing binaries for security risks
eBook Download: EPUB
2019
396 Seiten
Packt Publishing (Verlag)
978-1-78980-949-7 (ISBN)

Lese- und Medienproben

Binary Analysis Cookbook -  Born Michael Born
Systemvoraussetzungen
31,32 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

Explore open-source Linux tools and advanced binary analysis techniques to analyze malware, identify vulnerabilities in code, and mitigate information security risks




Key Features



  • Adopt a methodological approach to binary ELF analysis on Linux


  • Learn how to disassemble binaries and understand disassembled code


  • Discover how and when to patch a malicious binary during analysis



Book Description



Binary analysis is the process of examining a binary program to determine information security actions. It is a complex, constantly evolving, and challenging topic that crosses over into several domains of information technology and security.






This binary analysis book is designed to help you get started with the basics, before gradually advancing to challenging topics. Using a recipe-based approach, this book guides you through building a lab of virtual machines and installing tools to analyze binaries effectively. You'll begin by learning about the IA32 and ELF32 as well as IA64 and ELF64 specifications. The book will then guide you in developing a methodology and exploring a variety of tools for Linux binary analysis. As you advance, you'll learn how to analyze malicious 32-bit and 64-bit binaries and identify vulnerabilities. You'll even examine obfuscation and anti-analysis techniques, analyze polymorphed malicious binaries, and get a high-level overview of dynamic taint analysis and binary instrumentation concepts.






By the end of the book, you'll have gained comprehensive insights into binary analysis concepts and have developed the foundational skills to confidently delve into the realm of binary analysis.





What you will learn



  • Traverse the IA32, IA64, and ELF specifications


  • Explore Linux tools to disassemble ELF binaries


  • Identify vulnerabilities in 32-bit and 64-bit binaries


  • Discover actionable solutions to overcome the limitations in analyzing ELF binaries


  • Interpret the output of Linux tools to identify security risks in binaries


  • Understand how dynamic taint analysis works



Who this book is for



This book is for anyone looking to learn how to dissect ELF binaries using open-source tools available in Linux. If you're a Linux system administrator or information security professional, you'll find this guide useful. Basic knowledge of Linux, familiarity with virtualization technologies and the working of network sockets, and experience in basic Python or Bash scripting will assist you with understanding the concepts in this book


Explore open-source Linux tools and advanced binary analysis techniques to analyze malware, identify vulnerabilities in code, and mitigate information security risksKey FeaturesAdopt a methodological approach to binary ELF analysis on LinuxLearn how to disassemble binaries and understand disassembled codeDiscover how and when to patch a malicious binary during analysisBook DescriptionBinary analysis is the process of examining a binary program to determine information security actions. It is a complex, constantly evolving, and challenging topic that crosses over into several domains of information technology and security. This binary analysis book is designed to help you get started with the basics, before gradually advancing to challenging topics. Using a recipe-based approach, this book guides you through building a lab of virtual machines and installing tools to analyze binaries effectively. You'll begin by learning about the IA32 and ELF32 as well as IA64 and ELF64 specifications. The book will then guide you in developing a methodology and exploring a variety of tools for Linux binary analysis. As you advance, you'll learn how to analyze malicious 32-bit and 64-bit binaries and identify vulnerabilities. You'll even examine obfuscation and anti-analysis techniques, analyze polymorphed malicious binaries, and get a high-level overview of dynamic taint analysis and binary instrumentation concepts. By the end of the book, you'll have gained comprehensive insights into binary analysis concepts and have developed the foundational skills to confidently delve into the realm of binary analysis.What you will learnTraverse the IA32, IA64, and ELF specificationsExplore Linux tools to disassemble ELF binariesIdentify vulnerabilities in 32-bit and 64-bit binariesDiscover actionable solutions to overcome the limitations in analyzing ELF binariesInterpret the output of Linux tools to identify security risks in binariesUnderstand how dynamic taint analysis worksWho this book is forThis book is for anyone looking to learn how to dissect ELF binaries using open-source tools available in Linux. If you're a Linux system administrator or information security professional, you'll find this guide useful. Basic knowledge of Linux, familiarity with virtualization technologies and the working of network sockets, and experience in basic Python or Bash scripting will assist you with understanding the concepts in this book
Erscheint lt. Verlag 20.9.2019
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte binary analysis • EDB • ELF • GdB • GNU Binary Utilities • Linux Tools • virtualbox
ISBN-10 1-78980-949-5 / 1789809495
ISBN-13 978-1-78980-949-7 / 9781789809497
Haben Sie eine Frage zum Produkt?
EPUBEPUB (Adobe DRM)
Größe: 6,4 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belle­tristik und Sach­büchern. Der Fließ­text wird dynamisch an die Display- und Schrift­größe ange­passt. Auch für mobile Lese­geräte ist EPUB daher gut geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Vieweg (Verlag)
79,99