Preface -- Fundamentals of Assembly -- Fundamental of Windows -- Executable formats -- Reversing Binaries for Vulnerabilities -- Reversing .Net Applications -- Reversing Patches for Identification of Vulnerabilities -- Anti ReversingTechniques -- Index
Summary
Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. This title provides information on reverse engineering and concepts that can be used to identify the malicious patterns in vulnerable software. It includes fresh exploits through various case studies