Free Online Book Explains Reverse Engineering 23
Lifehack writes "There is a good online book available for reverse engineering software: 'This book is an attempt to provide an introduction to reverse engineering software under both Linux and Microsoft Windows. Since reverse engineering is under legal fire, the authors figure the best response is to make the knowledge widespread...'"
Re:For crying out loud... (Score:1)
Re:It's a nice overview (Score:1)
I can just anticipate the number of RTFB posts this article is going to generate.
Synonym (Score:3, Funny)
Re:Synonym (Score:2)
All Reverse Engineering I could had... (Score:2)
Oh... those were the days...
Does anyone has a link for any of those site/tuts?? (yeah yea.. i guess i could do a search in Google for it)[yes, I intentionally didnt made Google a verb =oP]
Re:All Reverse Engineering I could had... (Score:2)
Re:All Reverse Engineering I could had... (Score:2)
for crying out loud (Score:3, Informative)
For example: That's it! It's an intellectual's cock-tease! Pricks. Who posted this article?! Ye gods.
Disclaimer: My response to this article was partially fueled by anger accumulated in an effort only four hours old to violate a rather uncompliant binary.
Uninformed (Score:1)
Azureus DHT magnet link for RE tutorials (Score:2)
(Make sure to remove spaces when you copy/paste)
Will seed for 48 hours.
Uh... (Score:1)
Since reverse engineering is under legal fire, the authors figure the best response is to make the knowledge widespread...
So why not publish a single HTML tarball or pdf file rather than a bunch of hyperlinked documents? The "knowledge" will spread faster... (unless I'm blind and didn't see it)
Re:Uh... (Score:2)
Extremely lightweight (Score:3, Insightful)
The article (I refuse to call it a book) doesn't really even scratch the surface of what you need to know to do any serious reverse engineering. Yes, it covers some basics of things like debuggers and executable formats, but that's what man pages and header files are for. It doesn't even get as far as telling you how to tell you how to navigate through a simple dispatch table or loader stub, which are often used without any deliberate intent to obfuscate. If you want to tell people about true reverse engineering you should at least try to explain things like dynamically constructed dispatch tables, self-modifying code, and exception handlers used to implement on-the-fly decryption or decompression. Since the world has become so network-centric, a decent description of how to reverse-engineer protocols as well as code should also be considered a minimum requirement. Lacking all of these things, the cited article will leave the reader very little better off than they had been before in terms of actually puzzling out what something does or how it works.
Re:Extremely lightweight (Score:2)
Do you have any good resources about all this stuff (short of the K&R and man gcc)?
Regards
Reverse Engineering (Score:2)
I thought this story was going to be something interesting about the traditional meaning of reverse engineering [pilot3d.com], but it wasn't.
However, the link above is quite detailed and discusses the ability to digitize real-world objects into CAD.
available for reviewing on The Assayer (Score:2)
Dupe (Score:3, Informative)
Many promises, 0 delivered. (Score:1)
I ran into this book a couple weeks ago, sat down, and read the entire thing. That was not a very hard task.
I learnt nothing I didn't already know. Every single one of the goals outlined in the preface (including how you will, something like, "know assembly language thoroughly") are not met by this book. I think before they actively seek out a publisher they should actively write the other 95% required for this to have any useful information, let alone be a definitive guide.