Hacker Disassembling Uncovered | Basic Hacking Techniques


This book is dedicated to the basics of hacking—methods of analyzing programs using a debugger and disassembler. There is huge interest in this topic, but in reality, there are very few programmers who have mastered these methods on a professional level.

The majority of publications that touch on issues of analyzing and optimizing programs, as well as creating means of protecting information, delicately tiptoe around the fact that in order to competently find “holes” in a program without having its source code, you have to disassemble them. Restoring something that even somewhat resembles the source code is still considered an extremely complex task. In the book, the author describes a technology used by hackers that gives a practically identical source
code, and this includes programs in C++ as well, which are particularly difficult to disassemble.

The book gives a detailed description of ways to identify and reconstruct key structures of the source language—functions (including virtual ones), local and global variables, branching, loops, objects and their hierarchy, mathematical operators, etc. The disassembly methodology that we will look at has been formalized—i.e., it has been translated from an intuitive concept into a complete technology, available and comprehensible to almost anyone. The book contains a large number of unique practical materials. It is organized in such a manner that it will most certainly be useful to the everyday programmer as a manual on optimizing programs for modern intelligent compilers, and to the information protection specialist as a manual on looking for so-called “bugs.” The “from simple to complex” style of the book allows it to easily be used as a textbook for beginner analyzers and “code diggers.”

Table of Contents

  • Preface
  • Introduction
  • Part I - Getting Acquainted with Basic Hacking Techniques
  • Step One -Warming up
  • Step Two -Getting Acquainted with the Disassembler
  • Step Three -Surgery
  • Step Four -Getting Acquainted with the Debugger
  • Step Five - IDA Emerges onto the Scene
  • Step Six - Using a Disassembler with a Debugger
  • Step Seven -
  • Identifying Key Structures of High-Level
  • Languages
  • Part II - Ways of Making Software Analysis Difficult
  • Introduction
  • Counteracting Debuggers
  • Counteracting Disassemblers
  • An Invitation to the Discussion, or New Protection Tips
  • Hacker Disassembling Uncovered—How to…
  • Index

Download PDF

Happy learning!

Friendly Websites

https://igg-games.com/ https://pcgamestorrents.com/ https://pirateiro.com/ ettvdl.com https://dodi-repacks.site/ https://crackingpatching.com/ https://glodls.to/ https://prostylex.org/ https://haxnode.com/ https://freedownloadae.com/ https://www.novahax.com/ https://www.sadeempc.com/ freecoursesonline.me ftuapps.dev