The IDA pro book [[electronic resource] ] : the unofficial guide to the world's most popular disassembler / / Chris Eagle |
Autore | Eagle Chris |
Edizione | [2nd ed.] |
Pubbl/distr/stampa | San Francisco, : No Starch Press, 2011 |
Descrizione fisica | 1 online resource (954 p.) |
Disciplina |
004.2/4
004.24 005.14 |
Soggetto topico |
Disassemblers (Computer programs)
Debugging in computer science |
ISBN | 1-59327-395-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
The IDA Pro Book; PRAISE FOR THE FIRST EDITION OF THE IDA PRO BOOK; Acknowledgments; Introduction; I. Introduction to IDA; 1. Introduction to Disassembly; Disassembly Theory; The What of Disassembly; The Why of Disassembly; Malware Analysis; Vulnerability Analysis; Software Interoperability; Compiler Validation; Debugging Displays; The How of Disassembly; A Basic Disassembly Algorithm; Linear Sweep Disassembly; Recursive Descent Disassembly; Sequential Flow Instructions; Conditional Branching Instructions; Unconditional Branching Instructions; Function Call Instructions; Return Instructions
Summary2. Reversing and Disassembly Tools; Classification Tools; file; PE Tools; PEiD; Summary Tools; nm; ldd; objdump; otool; dumpbin; c++filt; Deep Inspection Tools; strings; Disassemblers; Summary; 3. IDA Pro Background; Hex-Rays' Stance on Piracy; Obtaining IDA Pro; IDA Versions; IDA Licenses; Purchasing IDA; Upgrading IDA; IDA Support Resources; Your IDA Installation; Windows Installation; OS X and Linux Installation; IDA and SELinux; 32-bit vs. 64-bit IDA; The IDA Directory Layout; Thoughts on IDA's User Interface; Summary; II. Basic IDA Usage; 4. Getting Started with IDA; Launching IDA IDA File LoadingUsing the Binary File Loader; IDA Database Files; IDA Database Creation; Closing IDA Databases; Reopening a Database; Introduction to the IDA Desktop; Desktop Behavior During Initial Analysis; IDA Desktop Tips and Tricks; Reporting Bugs; Summary; 5. IDA Data Displays; The Principal IDA Displays; The Disassembly Window; IDA Graph View; IDA Text View; The Functions Window; The Output Window; Secondary IDA Displays; The Hex View Window; The Exports Window; The Imports Window; The Structures Window; The Enums Window; Tertiary IDA Displays; The Strings Window; The Names Window The Segments WindowThe Signatures Window; The Type Libraries Window; The Function Calls Window; The Problems Window; Summary; 6. Disassembly Navigation; Basic IDA Navigation; Double-Click Navigation; Jump to Address; Navigation History; Stack Frames; Calling Conventions; The C Calling Convention; The Standard Calling Convention; The fastcall Convention for x86; C++ Calling Conventions; Other Calling Conventions; Local Variable Layout; Stack Frame Examples; IDA Stack Views; Searching the Database; Text Searches; Binary Searches; Summary; 7. Disassembly Manipulation; Names and Naming Parameters and Local VariablesNamed Locations; Register Names; Commenting in IDA; Regular Comments; Repeatable Comments; Anterior and Posterior Lines; Function Comments; Basic Code Transformations; Code Display Options; Formatting Instruction Operands; Manipulating Functions; Creating New Functions; Deleting Functions; Function Chunks; Function Attributes; Stack Pointer Adjustments; Converting Data to Code (and Vice Versa); Basic Data Transformations; Specifying Data Sizes; Working with Strings; Specifying Arrays; Summary; 8. Datatypes and Data Structures; Recognizing Data Structure Use Array Member Access |
Record Nr. | UNINA-9910818485303321 |
Eagle Chris | ||
San Francisco, : No Starch Press, 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Open source fuzzing tools [[electronic resource] /] / Gadi Evron ... [et al.] |
Edizione | [1st edition] |
Pubbl/distr/stampa | Burlington, MA, : Syngress Pub., c2007 |
Descrizione fisica | 1 online resource (209 p.) |
Disciplina |
005.14
005.8 |
Altri autori (Persone) | EvronGadi |
Soggetto topico |
Computer software - Testing
Open source software Debugging in computer science |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-14515-7
9786611145156 0-08-055561-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Open Source Fuzzing Tools; Copyright Page; Contributing Authors; Contents; Chapter 1: Introduction to Vulnerability Research; Statement of Scope; Off-by-One Errors; Programming Language Use Errors; Integer Overflows; Bugs and Vulnerabilities; The Vaunted Buffer Overflow; Finding Bugs and Vulnerabilities; Source Code Review; Black Box Testing; Glass Box Testing; Chapter 2: Fuzzing-What's That?; Introduction; Introduction to Fuzzing; Milestones in Fuzzing; Fuzzing Technology; Traffic Sniffing; Prepared Template; Second-Generation Fuzzing; File Fuzzing; Host-side Monitoring
Vulnerability Scanners as Fuzzers Uses of Fuzzing; Open Source Fuzzers; Commercial-Grade Fuzzers; What Comes Next; The Software Development Life Cycle; Chapter 3: Building a Fuzzing Environment; Introduction; Knowing What to Ask...; Basic Tools and Setup; Data Points; Crash Dumps; Fuzzer Output; Debuggers; Recon Tools; Linux; OSX; Summary; Chapter 4: Open Source Fuzzing Tools; Introduction; Frameworks; Special-Purpose Tools; General-Purpose Tools; Chapter 5: Commercial Fuzzing Solutions; Introduction; beSTORM (by Beyond Security); BPS-1000 (by BreakingPoint Systems); Codenomicon Mu-4000 Security Analyzer (by Mu Security)Chapter 6: Build Your Own Fuzzer; Hold Your Horses; Fuzzer Building Blocks; One or More Valid Data Sets; Understanding What Each Bytein the Data Set Means; Change the Values of the Data Sets While Maintaining the Integrity of the Data Being Sent; Recreate the Same Malformed DataSet Time and Time Again; An Arsenal of Malformed Values, or the Ability to Create a Variety of Malformed Outputs; Maintain a Form of a State Machine; Summarize; Down to Business; Simplest Fuzz Testing Find Issues; Chapter 7: Integration of Fuzzing in the Development Cycle Introduction Why Is Fuzzing Important to Include in a Software Development Cycle?; Security Testing Workload; Setting Expectations for Fuzzers in a Software Development Lifecycle; Fuzzing as a Panacea; Fuzzing Tools versus ...; Setting the Plan for Implementing Fuzzers into a Software Development Lifecycle; Setting Goals; Building and Executing on the Plan; Understanding How to Increase Effectiveness of Fuzzers, and Avoiding Any Big Gotchas; Hidden Costs; Finding More Vulnerabilities; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8: Standardization and Certification Fuzzing and the Corporate Environment Software Security Testing, the Challenges; Testing for Security; Fuzzing as a Viable Option; Business Pressure; Software Security Certification; Meeting Standards and Compliance; Tester Certification; Industry Pressure; Antivirus Product Testing and Certification; Chapter 9: What Is a File?; Introduction; Are File Fuzzers Special?; Analyzing and Building Files; Textual Files; Binary Files; Running the Test; Monitoring the Application with the Test Cases; Chapter 10: Code Coverage and Fuzzing; Introduction; Code Coverage; Obtaining Code Coverage Instrumenting the Binary |
Record Nr. | UNINA-9910458833603321 |
Burlington, MA, : Syngress Pub., c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Open source fuzzing tools [[electronic resource] /] / Gadi Evron ... [et al.] |
Edizione | [1st edition] |
Pubbl/distr/stampa | Burlington, MA, : Syngress Pub., c2007 |
Descrizione fisica | 1 online resource (209 p.) |
Disciplina |
005.14
005.8 |
Altri autori (Persone) | EvronGadi |
Soggetto topico |
Computer software - Testing
Open source software Debugging in computer science |
ISBN |
1-281-14515-7
9786611145156 0-08-055561-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Open Source Fuzzing Tools; Copyright Page; Contributing Authors; Contents; Chapter 1: Introduction to Vulnerability Research; Statement of Scope; Off-by-One Errors; Programming Language Use Errors; Integer Overflows; Bugs and Vulnerabilities; The Vaunted Buffer Overflow; Finding Bugs and Vulnerabilities; Source Code Review; Black Box Testing; Glass Box Testing; Chapter 2: Fuzzing-What's That?; Introduction; Introduction to Fuzzing; Milestones in Fuzzing; Fuzzing Technology; Traffic Sniffing; Prepared Template; Second-Generation Fuzzing; File Fuzzing; Host-side Monitoring
Vulnerability Scanners as Fuzzers Uses of Fuzzing; Open Source Fuzzers; Commercial-Grade Fuzzers; What Comes Next; The Software Development Life Cycle; Chapter 3: Building a Fuzzing Environment; Introduction; Knowing What to Ask...; Basic Tools and Setup; Data Points; Crash Dumps; Fuzzer Output; Debuggers; Recon Tools; Linux; OSX; Summary; Chapter 4: Open Source Fuzzing Tools; Introduction; Frameworks; Special-Purpose Tools; General-Purpose Tools; Chapter 5: Commercial Fuzzing Solutions; Introduction; beSTORM (by Beyond Security); BPS-1000 (by BreakingPoint Systems); Codenomicon Mu-4000 Security Analyzer (by Mu Security)Chapter 6: Build Your Own Fuzzer; Hold Your Horses; Fuzzer Building Blocks; One or More Valid Data Sets; Understanding What Each Bytein the Data Set Means; Change the Values of the Data Sets While Maintaining the Integrity of the Data Being Sent; Recreate the Same Malformed DataSet Time and Time Again; An Arsenal of Malformed Values, or the Ability to Create a Variety of Malformed Outputs; Maintain a Form of a State Machine; Summarize; Down to Business; Simplest Fuzz Testing Find Issues; Chapter 7: Integration of Fuzzing in the Development Cycle Introduction Why Is Fuzzing Important to Include in a Software Development Cycle?; Security Testing Workload; Setting Expectations for Fuzzers in a Software Development Lifecycle; Fuzzing as a Panacea; Fuzzing Tools versus ...; Setting the Plan for Implementing Fuzzers into a Software Development Lifecycle; Setting Goals; Building and Executing on the Plan; Understanding How to Increase Effectiveness of Fuzzers, and Avoiding Any Big Gotchas; Hidden Costs; Finding More Vulnerabilities; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8: Standardization and Certification Fuzzing and the Corporate Environment Software Security Testing, the Challenges; Testing for Security; Fuzzing as a Viable Option; Business Pressure; Software Security Certification; Meeting Standards and Compliance; Tester Certification; Industry Pressure; Antivirus Product Testing and Certification; Chapter 9: What Is a File?; Introduction; Are File Fuzzers Special?; Analyzing and Building Files; Textual Files; Binary Files; Running the Test; Monitoring the Application with the Test Cases; Chapter 10: Code Coverage and Fuzzing; Introduction; Code Coverage; Obtaining Code Coverage Instrumenting the Binary |
Record Nr. | UNINA-9910784616803321 |
Burlington, MA, : Syngress Pub., c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Open source fuzzing tools [[electronic resource] /] / Gadi Evron ... [et al.] |
Edizione | [1st edition] |
Pubbl/distr/stampa | Burlington, MA, : Syngress Pub., c2007 |
Descrizione fisica | 1 online resource (209 p.) |
Disciplina |
005.14
005.8 |
Altri autori (Persone) | EvronGadi |
Soggetto topico |
Computer software - Testing
Open source software Debugging in computer science |
ISBN |
1-281-14515-7
9786611145156 0-08-055561-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Open Source Fuzzing Tools; Copyright Page; Contributing Authors; Contents; Chapter 1: Introduction to Vulnerability Research; Statement of Scope; Off-by-One Errors; Programming Language Use Errors; Integer Overflows; Bugs and Vulnerabilities; The Vaunted Buffer Overflow; Finding Bugs and Vulnerabilities; Source Code Review; Black Box Testing; Glass Box Testing; Chapter 2: Fuzzing-What's That?; Introduction; Introduction to Fuzzing; Milestones in Fuzzing; Fuzzing Technology; Traffic Sniffing; Prepared Template; Second-Generation Fuzzing; File Fuzzing; Host-side Monitoring
Vulnerability Scanners as Fuzzers Uses of Fuzzing; Open Source Fuzzers; Commercial-Grade Fuzzers; What Comes Next; The Software Development Life Cycle; Chapter 3: Building a Fuzzing Environment; Introduction; Knowing What to Ask...; Basic Tools and Setup; Data Points; Crash Dumps; Fuzzer Output; Debuggers; Recon Tools; Linux; OSX; Summary; Chapter 4: Open Source Fuzzing Tools; Introduction; Frameworks; Special-Purpose Tools; General-Purpose Tools; Chapter 5: Commercial Fuzzing Solutions; Introduction; beSTORM (by Beyond Security); BPS-1000 (by BreakingPoint Systems); Codenomicon Mu-4000 Security Analyzer (by Mu Security)Chapter 6: Build Your Own Fuzzer; Hold Your Horses; Fuzzer Building Blocks; One or More Valid Data Sets; Understanding What Each Bytein the Data Set Means; Change the Values of the Data Sets While Maintaining the Integrity of the Data Being Sent; Recreate the Same Malformed DataSet Time and Time Again; An Arsenal of Malformed Values, or the Ability to Create a Variety of Malformed Outputs; Maintain a Form of a State Machine; Summarize; Down to Business; Simplest Fuzz Testing Find Issues; Chapter 7: Integration of Fuzzing in the Development Cycle Introduction Why Is Fuzzing Important to Include in a Software Development Cycle?; Security Testing Workload; Setting Expectations for Fuzzers in a Software Development Lifecycle; Fuzzing as a Panacea; Fuzzing Tools versus ...; Setting the Plan for Implementing Fuzzers into a Software Development Lifecycle; Setting Goals; Building and Executing on the Plan; Understanding How to Increase Effectiveness of Fuzzers, and Avoiding Any Big Gotchas; Hidden Costs; Finding More Vulnerabilities; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8: Standardization and Certification Fuzzing and the Corporate Environment Software Security Testing, the Challenges; Testing for Security; Fuzzing as a Viable Option; Business Pressure; Software Security Certification; Meeting Standards and Compliance; Tester Certification; Industry Pressure; Antivirus Product Testing and Certification; Chapter 9: What Is a File?; Introduction; Are File Fuzzers Special?; Analyzing and Building Files; Textual Files; Binary Files; Running the Test; Monitoring the Application with the Test Cases; Chapter 10: Code Coverage and Fuzzing; Introduction; Code Coverage; Obtaining Code Coverage Instrumenting the Binary |
Record Nr. | UNINA-9910812476703321 |
Burlington, MA, : Syngress Pub., c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Practical Debugging at Scale : Cloud Native Debugging in Kubernetes and Production / / Shai Almog |
Autore | Almog Shai |
Edizione | [First edition.] |
Pubbl/distr/stampa | New York, NY : , : Apress Media LLC, , [2023] |
Descrizione fisica | 1 online resource |
Disciplina | 005.3 |
Soggetto topico |
Application software - Development
Cloud computing Debugging in computer science |
ISBN | 1-4842-9042-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Part I. Basics -- 1. Know Your Debugger -- 2. The Checklist -- 3. The Auxiliary Tools -- 4. Logging, Testing, and Fail Fast -- 5. Time Travel Debugging -- Part II. The Modern Production Environment -- 6. Debugging Kubernetes -- 7. Serverless Debugging -- 8. Fullstack Debugging -- 9. Observability and Monitoring -- 10. Developer Observability -- -- Part III. In Practice -- 11. Tools of Learning -- 12. Performance and Memory -- 13. Security -- 14. Bug Strategies -- Appendix A: References. |
Record Nr. | UNINA-9910637733503321 |
Almog Shai | ||
New York, NY : , : Apress Media LLC, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Practical malware analysis [[electronic resource] ] : the hands-on guide to dissecting malicious software / / by Michael Sikorski and Andrew Honig |
Autore | Sikorski Michael |
Pubbl/distr/stampa | San Francisco, : No Starch Press, c2012 |
Descrizione fisica | XXXI, 766 p.; ; 24 cm |
Disciplina | 005.8/4 |
Altri autori (Persone) | HonigAndrew |
Soggetto topico |
Malware (Computer software)
Computer viruses Debugging in computer science Computer security |
Soggetto genere / forma | Electronic books. |
ISBN |
9781593274306
9781593272906 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | pt. 1. Basic analysis -- pt. 2. Advanced static analysis -- pt. 3. Advanced dynamic analysis -- pt. 4. Malware functionality -- pt. 5. Anti-reverse-engineering -- pt. 6. Special topics. |
Record Nr. | UNINA-9910141304103321 |
Sikorski Michael | ||
San Francisco, : No Starch Press, c2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Practical malware analysis : the hands-on guide to dissecting malicious software / / by Michael Sikorski and Andrew Honig |
Autore | Sikorski Michael |
Pubbl/distr/stampa | San Francisco, : No Starch Press, c2012 |
Descrizione fisica | XXXI, 766 p.; ; 24 cm |
Disciplina | 005.8/4 |
Altri autori (Persone) | HonigAndrew |
Soggetto topico |
Malware (Computer software)
Computer viruses Debugging in computer science Computer security |
ISBN | 1-59327-430-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | pt. 1. Basic analysis -- pt. 2. Advanced static analysis -- pt. 3. Advanced dynamic analysis -- pt. 4. Malware functionality -- pt. 5. Anti-reverse-engineering -- pt. 6. Special topics. |
Record Nr. | UNINA-9910790145203321 |
Sikorski Michael | ||
San Francisco, : No Starch Press, c2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Practical malware analysis : the hands-on guide to dissecting malicious software / / by Michael Sikorski and Andrew Honig |
Autore | Sikorski Michael |
Pubbl/distr/stampa | San Francisco, : No Starch Press, c2012 |
Descrizione fisica | XXXI, 766 p.; ; 24 cm |
Disciplina | 005.8/4 |
Altri autori (Persone) | HonigAndrew |
Soggetto topico |
Malware (Computer software)
Computer viruses Debugging in computer science Computer security |
ISBN | 1-59327-430-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | pt. 1. Basic analysis -- pt. 2. Advanced static analysis -- pt. 3. Advanced dynamic analysis -- pt. 4. Malware functionality -- pt. 5. Anti-reverse-engineering -- pt. 6. Special topics. |
Record Nr. | UNINA-9910817360103321 |
Sikorski Michael | ||
San Francisco, : No Starch Press, c2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Problem determination across multiple WebSphere products AIX Platform [[electronic resource] /] / Peter Kovari ... [et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Armonk, N.Y., : IBM, 2004 |
Descrizione fisica | 386 p. : ill |
Disciplina | 005.376 |
Collana | Redbooks |
Soggetto topico |
Debugging in computer science
Web servers - Computer programs Web site development Application software - Development |
Soggetto genere / forma | Electronic books. |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910450114803321 |
Armonk, N.Y., : IBM, 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Problem determination across multiple WebSphere products AIX Platform [[electronic resource] /] / Peter Kovari ... [et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Armonk, N.Y., : IBM, 2004 |
Descrizione fisica | 386 p. : ill |
Disciplina | 005.376 |
Collana | Redbooks |
Soggetto topico |
Debugging in computer science
Web servers - Computer programs Web site development Application software - Development |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910783102903321 |
Armonk, N.Y., : IBM, 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|