Inhoudsopgave:
\u003cp\u003e\u003cb\u003eLearn how to use Ghidra to analyze your code for potential vulnerabilities and examine both malware and network threats\u003c/b\u003e\u003c/p\u003e\u003ch4\u003eKey Features\u003c/h4\u003e\u003cul\u003e\u003cli\u003eMake the most of Ghidra on different platforms such as Linux, Windows, and macOS\u003c/li\u003e\u003cli\u003eUnlock the potential of plug-ins and extensions for disassembly, assembly, decompilation, and scripting\u003c/li\u003e\u003cli\u003eLearn advanced concepts like binary diffing, debugging, unpacking real-world malware samples, and reverse engineering ransomware\u003c/li\u003e\u003cli\u003ePurchase of the print or Kindle book includes a free PDF eBook\u003c/li\u003e\u003c/ul\u003e\u003ch4\u003eBook Description\u003c/h4\u003eWritten by David Ãlvarez Pérez, a senior malware analyst at Gen Digital Inc., and Ravikant Tiwari, a senior security researcher at Microsoft, with expertise in malware and threat detection, this book is a complete guide to using Ghidra for examining malware, making patches, and customizing its features for your cybersecurity needs.\nThis updated edition walks you through implementing Ghidraâs capabilities and automating reverse-engineering tasks with its plugins. Youâll learn how to set up an environment for practical malware analysis, use Ghidra in headless mode, and leverage Ghidra scripting to automate vulnerability detection in executable binaries. Advanced topics such as creating Ghidra plugins, adding new binary formats, analyzing processor modules, and contributing to the Ghidra project are thoroughly covered too.\nThis edition also simplifies complex concepts such as remote and kernel debugging and binary diffing, and their practical uses, especially in malware analysis. From unpacking malware to analyzing modern ransomware, youâll acquire the skills necessary for handling real-world cybersecurity challenges.\nBy the end of this Ghidra book, youâll be adept at avoiding potential vulnerabilities in code, extending Ghidra for advanced reverse-engineering, and applying your skills to strengthen your cybersecurity strategies.\u003ch4\u003eWhat you will learn\u003c/h4\u003e\u003cul\u003e\u003cli\u003eDevelop and integrate your own Ghidra extensions\u003c/li\u003e\u003cli\u003eDiscover how to use Ghidra in headless mode\u003c/li\u003e\u003cli\u003eExtend Ghidra for advanced reverse-engineering\u003c/li\u003e\u003cli\u003ePerform binary differencing for use cases such as patch and vulnerability analysis\u003c/li\u003e\u003cli\u003ePerform debugging locally and in a remote environment\u003c/li\u003e\u003cli\u003eApply your skills to real-world malware analysis scenarios including ransomware analysis and unpacking malware\u003c/li\u003e\u003cli\u003eAutomate vulnerability detection in executable binaries using Ghidra scripting\u003c/li\u003e\u003c/ul\u003e\u003ch4\u003eWho this book is for\u003c/h4\u003eThis book is for software engineers, security researchers, and professionals working in software development and testing who want to deepen their expertise in reverse engineering and cybersecurity. Aspiring malware analysts and vulnerability researchers will also benefit greatly. Prior experience with Java or Python and a foundational understanding of programming is recommended. |