中文名称:逆向工程资源
英文名称:Reverse Engineering
发行时间:2005年
地区:美国
语言:英语
简介:
注该系列为英文版, 内网做种。
已通过安全检测:
安全检测软件软件:Symante Antivirus 企业版
版本号:8.1.0.821
病毒库日期:2005-10-26 rev .7
长驻 Razorback 2.0 7*24小时开机
这次发点关于逆向工程的资源, 有兴趣的朋友可以一起讨论讨论
工具包里有些东西我也没用过 所以请不要问我怎么用
反向工程:
软件的"反向工程”,或称"逆向工程”,是指对软件的结构、流程、算法、代码等进行逆向拆解和分析。在原创者不愿公布硬件或软件产品的上述技术特征的情况下,竞争者可以利用"反向工程”进行仿制生产,而配套产品生产者则也希望通过"反向工程”生产出在技术上与原产品兼容的设备。由于"反向工程”可导致原产品的核心技术被他人知晓,因此掌握先进技术的软件开发者往往需要在其产品中加入防止"反向工程”的技术措施。
In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in detail the five most important disciplines for security professionals and software developers: Coding, Sockets, Shellcode, Porting Applications, and Coding Security Tools.
"Read every page of this book, understand the content, and use it to your advantage."--Stuart McClure
Download the CodeAll code lines throughout the book are numbered for easy reference and are available for download from [url]www.syngress.com/solutions.[/url]
Develop ShellcodeCustomize and optimize never-before-seen shellcode that can exploit almost any system.
Port Public ExploitsFollow step-by-step instructions for porting exploits to work on Windows, Linux, UNIX, and even Macs!
Customize Windows COM ObjectsWrap and automate pre-compiled exploits and security tools such as Nmap, netcat, and hping.
Enhance NiktoDevelop customized code to dramatically improve the performance of the Nikto Web server scanner.
Reverse Engineer Zero DaysLearn to reverse engineer, modify, and re-automate Zero-Day exploit code.
Write NASL ScriptsDevelop scripts for Nessus to discover the latest vulnerabilities.
Identify and Target VulnerabilitiesExamine case studies that reveal how attackers identify and exploit security holes.
Master SocketsDetailed code examples demonstrate socket initialization, closing sockets, reading and writing data.
Your Solutions Membership Gives You Access to:
A comprehensive FAQ page that consolidates all of the key points of this book into an easy-to-search Web page
"From the Author" Forum where the authors post timely updates and links to related sites
The complete code listings from the book
Downloadable chapters from these best-selling books:
Buffer Overflow Attacks: Detect, Exploit, Prevent
Programmer's Ultimate Security DeskRef
Hacking the Code: ASP.NET Web Application Security
Nessus Network Auditing
Book Description
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.
* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products
* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware
* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language
Tool Pack
- System Tools
Windows system variables
Scripting tool kit
Registry Patches Creator
Registry Docs
Reg& REGINI
Reg-Cracking-Engine
MCI doc
Elevate permission application launcher
Dos Batch Programming Guide
CMD Tools
CMD Basic Help
- Other Tools
WinCRC32
Sysinternals process explorer
Systinternals ntregmon
Systinternals ntfilmon
Setup Builder
Scooter Beyond Compare
Rar 3.2 command Line
Install Rite
Evidence Mini HTML Browser
Advance Crc Utility
7 Zip 2.3
- DIZ, Info, Txt Tools
txt2exe
terminal fonts
legacy file
flyingcode NFO viewer
eminence NFO viewer
elton's NFO
- Cracking Tools
WinHEX
W32Dasm
stup_PE
SoftICE
revirgin
ProcDump32
PE Explorer
Patch Maker
IDA to SoftICE symbol loader
FCTR UFX GUI
Datarescue IDA PRO
地址: [url]http://emule.cdp2p.com/Article/info/b8/200604/Article_37023.html[/url]
英文名称:Reverse Engineering
发行时间:2005年
地区:美国
语言:英语
简介:
注该系列为英文版, 内网做种。
已通过安全检测:
安全检测软件软件:Symante Antivirus 企业版
版本号:8.1.0.821
病毒库日期:2005-10-26 rev .7
长驻 Razorback 2.0 7*24小时开机
这次发点关于逆向工程的资源, 有兴趣的朋友可以一起讨论讨论
工具包里有些东西我也没用过 所以请不要问我怎么用
反向工程:
软件的"反向工程”,或称"逆向工程”,是指对软件的结构、流程、算法、代码等进行逆向拆解和分析。在原创者不愿公布硬件或软件产品的上述技术特征的情况下,竞争者可以利用"反向工程”进行仿制生产,而配套产品生产者则也希望通过"反向工程”生产出在技术上与原产品兼容的设备。由于"反向工程”可导致原产品的核心技术被他人知晓,因此掌握先进技术的软件开发者往往需要在其产品中加入防止"反向工程”的技术措施。
In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in detail the five most important disciplines for security professionals and software developers: Coding, Sockets, Shellcode, Porting Applications, and Coding Security Tools.
"Read every page of this book, understand the content, and use it to your advantage."--Stuart McClure
Download the CodeAll code lines throughout the book are numbered for easy reference and are available for download from [url]www.syngress.com/solutions.[/url]
Develop ShellcodeCustomize and optimize never-before-seen shellcode that can exploit almost any system.
Port Public ExploitsFollow step-by-step instructions for porting exploits to work on Windows, Linux, UNIX, and even Macs!
Customize Windows COM ObjectsWrap and automate pre-compiled exploits and security tools such as Nmap, netcat, and hping.
Enhance NiktoDevelop customized code to dramatically improve the performance of the Nikto Web server scanner.
Reverse Engineer Zero DaysLearn to reverse engineer, modify, and re-automate Zero-Day exploit code.
Write NASL ScriptsDevelop scripts for Nessus to discover the latest vulnerabilities.
Identify and Target VulnerabilitiesExamine case studies that reveal how attackers identify and exploit security holes.
Master SocketsDetailed code examples demonstrate socket initialization, closing sockets, reading and writing data.
Your Solutions Membership Gives You Access to:
A comprehensive FAQ page that consolidates all of the key points of this book into an easy-to-search Web page
"From the Author" Forum where the authors post timely updates and links to related sites
The complete code listings from the book
Downloadable chapters from these best-selling books:
Buffer Overflow Attacks: Detect, Exploit, Prevent
Programmer's Ultimate Security DeskRef
Hacking the Code: ASP.NET Web Application Security
Nessus Network Auditing
Book Description
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.
* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products
* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware
* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language
Tool Pack
- System Tools
Windows system variables
Scripting tool kit
Registry Patches Creator
Registry Docs
Reg& REGINI
Reg-Cracking-Engine
MCI doc
Elevate permission application launcher
Dos Batch Programming Guide
CMD Tools
CMD Basic Help
- Other Tools
WinCRC32
Sysinternals process explorer
Systinternals ntregmon
Systinternals ntfilmon
Setup Builder
Scooter Beyond Compare
Rar 3.2 command Line
Install Rite
Evidence Mini HTML Browser
Advance Crc Utility
7 Zip 2.3
- DIZ, Info, Txt Tools
txt2exe
terminal fonts
legacy file
flyingcode NFO viewer
eminence NFO viewer
elton's NFO
- Cracking Tools
WinHEX
W32Dasm
stup_PE
SoftICE
revirgin
ProcDump32
PE Explorer
Patch Maker
IDA to SoftICE symbol loader
FCTR UFX GUI
Datarescue IDA PRO
地址: [url]http://emule.cdp2p.com/Article/info/b8/200604/Article_37023.html[/url]