#379 in Computers & technology books
Use arrows to jump to the previous/next product
Reddit mentions of The IDA Pro Book, 2nd Edition: The Unofficial Guide to the World's Most Popular Disassembler
Sentiment score: 7
Reddit mentions: 11
We found 11 Reddit mentions of The IDA Pro Book, 2nd Edition: The Unofficial Guide to the World's Most Popular Disassembler. Here are the top ones.
Buying options
View on Amazon.comor
- Used Book in Good Condition
Features:
Specs:
Color | Multicolor |
Height | 9.27 Inches |
Length | 7.06 Inches |
Number of items | 1 |
Release date | July 2011 |
Weight | 2.4 Pounds |
Width | 1.58 Inches |
For reverse engineering:
For malware analysis and malware techniques
For programming
This should be enough for you to get started.
Hey /u/Xerack! I'm the original author of the post linked here.
Appreciate the feedback! If you think I could clarify anything better, please let me know.
As far as resources for Reverse Engineering, I can provide you with a baseline that I would recommend starting with.
x86 Assembly:
If you don't know assembly language at all, this list of videos was where I picked up a decent amount of x86 assembly language.
A few good books would be:
Hands On:
Courses:
Tons of courses on youtube. I learn well from visual, so I recommend these youtube videos:
Beyond that, Google will always be your friend, and /r/reverseengineering. I also have a bunch of material for Malware RE, but that's a bit different than Software RE, though it is relatable.
Yea, I actually recommended one in the post above. Here's a direct link though
I'm recommending this only because it's the one book on the topic that I've read and it was really good. There's others too, like this one, but I haven't read them so I can't comment.
Any book about reverse engineering can only teach you the most basic things. But it teaches you enough that once you're on your own, you aren't lost. If you want to develop the skills further, just start disassembling OS functions and figuring out how they work.
Another book that's tangentially related is this one. It isn't about reverse engineering specifically, but rather about debugging (usually without source code), which is obviously a critical skill.
Learn to write simple C programs. Then debug your own C programs, preferably in OS X or Linux using gcc/gdb. Then disassemble your own C code (learn how to disable optimization in the compiler; try it with no optimizaiton and then with increasing levels). Then look at C++ and (gasp) Visual BASIC and such. Turns out a ton of malware is written in these languages, and the snarl of garbage that you'll uncover that is just part of the auto-generated message handling stuff for VB will astound you, so don't start there...but it's important to understand those structures when you see them.
Then follow tutorials about reversing other programs. There are great books on this.
It helps a lot to know assembly language, but you'll tend to pick it up as you go.
You'll want better tools than just command-line disassemblers. I prefer IDA Pro.
There's a great book that uses IDA Pro with many examples to address precisely your questions.
Here's another great book on malware analysis that covers all kinds of tricks you might bump into when working on real targets.
I see all this as a long-term iterative exercise. It's fascinating.
Some resources which will indirectly help you for GREM
https://amzn.com/1593272901
https://amzn.com/1118787315
https://amzn.com/1593272898
chrome runs at user app level. it's not running in kernal space with rootkit-like functionality.
Google going out of there way to try and illegally spy on you is crazy. simply because any interested party can go and grab a copy of IDA pro and slap it onto chrome right now and do live disassemble the code base as it's running. Watch the stack calls, view library calls, and view network traffic.
But if the overly paranode type. Then go an investigate for yourself you have access to the tools and the books to self-learn the skills need to do so. Here a good jumping off point
http://out7.hex-rays.com/demo/request < request a trail evulation of ida pro
read this
https://www.amazon.ca/Reversing-Secrets-Engineering-Eldad-Eilam/dp/0764574817
this
https://www.amazon.ca/IDA-Pro-Book-Unofficial-Disassembler/dp/1593272898
and finally this
https://www.apress.com/gp/book/9781484200650
In case you're talking about reverse engineering, malware analysis etc.:
There are a ton of different things you can do on the defensive side. The path here is a bit less defined because you can specialize in each of these areas with out ever really touching the other ones. But I think these are the most important skills as a defender, so I’ll break it up into three smaller chunks. For the most part, defender/Blue-team concepts draw from these skills, I’ve setup the courses in order, as some of these skills may feed into other areas.
IR:
Forensics:
Reverse Engineering (Dynamic and Static):
I know there’s not a lot of certs here, and unfortunately, that’s how it is across the blue team. Certs here are usually very vendor-specific, and not applicable to defense as a whole. Those certifications exist, but I’m not listing them here.
If people are interested, I can also do a similar write-up on Mobile Forensics and Cloud Forensics (which is my direct background).
Lastly, here are some of my favorite news sources across the InfoSec community -
News Sources
This is a good book. You will obviously need to have some understanding of assembly language for whatever platform you are interested in targeting (I am guessing x86?)
My recommendations then for self study:
Read all those and you will be in good shape ;)
EDIT: I hate trying to get reddit to do what I want.
He wrote a book as well, highly recommended: http://smile.amazon.com/dp/1593272898 - one of the only definitive sources for IDA Pro information that isn't scattered about all over the Intardnets.