Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036

Ghidra Software Reverse-Engineering for Beginners: Master the art of debugging, from understanding code to mitigating threats

Sprog
Engelsk
Format
Kategori

Fakta

Written by David Álvarez Pérez, a senior malware analyst at Gen Digital Inc., and Ravikant Tiwari, a senior security researcher at Microsoft, with expertise in malware and threat detection, this book is a complete guide to using Ghidra for examining malware, making patches, and customizing its features for your cybersecurity needs. This updated edition walks you through implementing Ghidra’s capabilities and automating reverse-engineering tasks with its plugins. You’ll learn how to set up an environment for practical malware analysis, use Ghidra in headless mode, and leverage Ghidra scripting to automate vulnerability detection in executable binaries. Advanced topics such as creating Ghidra plugins, adding new binary formats, analyzing processor modules, and contributing to the Ghidra project are thoroughly covered too. This edition also simplifies complex concepts such as remote and kernel debugging and binary diffing, and their practical uses, especially in malware analysis. From unpacking malware to analyzing modern ransomware, you’ll acquire the skills necessary for handling real-world cybersecurity challenges. By the end of this Ghidra book, you’ll be adept at avoiding potential vulnerabilities in code, extending Ghidra for advanced reverse-engineering, and applying your skills to strengthen your cybersecurity strategies.

© 2025 Packt Publishing (E-bog): 9781835889831

Release date

E-bog: 17. januar 2025

Andre kan også lide...

  1. Antivirus Bypass Techniques: Learn practical techniques and tactics to combat, bypass, and evade antivirus software Uriel Kosayev
  2. Microsoft Azure Security Technologies Certification and Beyond: Gain practical skills to secure your Azure environment and pass the AZ-500 exam David Okeyode
  3. Penetration Testing Azure for Ethical Hackers: Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments David Okeyode
  4. Learn Red - Fundamentals of Red : Get up and running with the Red language for full-stack development: Get up and running with the Red language for full-stack development Ivo Balbaert
  5. The Vulnerability Researcher's Handbook: A comprehensive guide to discovering, reporting, and publishing security vulnerabilities Benjamin Strout
  6. Cloud Security Handbook: Find out how to effectively secure cloud environments using AWS, Azure, and GCP Eyal Estrin
  7. Security Orchestration, Automation, and Response for Security Analysts: Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture Benjamin Kovacevic
  8. Cloud Penetration Testing: Learn how to effectively pentest AWS, Azure, and GCP applications Kim Crawley
  9. Network Vulnerability Assessment: Identify security loopholes in your network's infrastructure Sagar Rahalkar
  10. TLS Cryptography In-Depth: Explore the intricacies of modern cryptography and the inner workings of TLS Dr. Paul Duplys
  11. Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting Roberto Martinez
  12. Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs Mostafa Yahia
  13. Hack the Cybersecurity Interview: Navigate Cybersecurity Interviews with Confidence, from Entry-level to Expert roles Ken Underhill
  14. Azure Security Cookbook: Practical recipes for securing Azure resources and operations Steve Miles
  15. Executive's Cybersecurity Program Handbook: A comprehensive guide to building and operationalizing a complete cybersecurity program Jason Brown
  16. Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities Jason Deyalsingh
  17. Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide: Learn to perform professional penetration testing for highly-secured environments with this intensive hands-on guide with this book and ebook. Lee Allen
  18. Security Automation with Python: Practical Python solutions for automating and scaling security operations Corey Charles Sr.
  19. Critical Infrastructure Security: Cybersecurity lessons learned from real-world breaches Soledad Antelada Toledano
  20. Securing Industrial Control Systems and Safety Instrumented Systems: A practical guide for safeguarding mission and safety critical systems Jalal Bouhdada
  21. Cybersecurity Threats, Malware Trends, and Strategies: Discover risk mitigation strategies for modern threats to your organization Tim Rains
  22. Official Google Cloud Certified Professional Cloud Security Engineer Exam Guide: Become an expert and get Google Cloud certified with this practitioner's guide Prashant Kulkarni
  23. Cloud Native Software Security Handbook: Unleash the power of cloud native tools for robust security in modern applications Mihir Shah
  24. Microsoft Defender for Cloud Cookbook: Protect multicloud and hybrid cloud environments, manage compliance and strengthen security posture Sasha Kranjac
  25. Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture Lester Nichols
  26. The Art of Social Engineering: Uncover the secrets behind the human dynamics in cybersecurity Cesar Bravo
  27. Human Proxies in Cryptographic Networks: Establishing a new direction to end-to-end encryption with the introduction of the inner envelope in the echo protocol Uni Nurf
  28. Privacy-Preserving Machine Learning: A use-case-driven approach to building and protecting ML pipelines from privacy and security threats Srinivasa Rao Aravilli
  29. Advanced Network Simulations Simplified: Practical guide for wired, Wi-Fi (802.11n/ac/ax), and LTE networks using ns-3 Dr Anil Kumar Rangisetti
  30. Kali Linux Intrusion and Exploitation Cookbook: Powerful recipes to detect vulnerabilities and perform security assessments Dhruv Shah
  31. Cybersecurity - Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics Yuri Diogenes
  32. Practical Linux Security Cookbook: Secure your Linux environment from modern-day attacks with practical recipes Tajinder Kalsi
  33. Unveiling the NIST Risk Management Framework (RMF): A practical guide to implementing RMF and managing risks in your organization Thomas Marsland
  34. The History of the Port of London: A Vast Emporium of All Nations Peter Stone
  35. The Future of Us: The Science of What We'll Eat, Where We'll Live, and Who We'll Be Jay Ingram
  36. Brain Gain: Technology and the Quest for Digital Wisdom Marc Prensky
  37. Blaming Technology: The Irrational Search for Scapegoats Samuel C. Florman
  38. A Connecticut Yankee in Criminal Court: The Mark Twain Mysteries #2 Peter J. Heck
  39. Mining Disasters of the Wyoming Valley Bryan Glahn
  40. The Mystery of the Hasty Arrow Anna Katharine Green
  41. Forgotten Tales of Wisconsin Martin Hintz
  42. Unfreedom: Slavery and Dependence in Eighteenth-Century Boston Jared Ross Hardesty
  43. Cudjo's Own Story of the Last African Slaver Zora Neale Hurston
  44. The Spike: How Our Lives Are Being Transformed by Rapidly Advancing Technologies Damien Broderick
  45. The Carpet from Bagdad Harold MacGrath
  46. Crossing Over: A Mexican Family on the Migrant Trail Rubén Martínez
  47. The True Story of Uncle Tom's Life: Autobiography of the Rev. Josiah Henson: The True Life Story Behind "Uncle Tom's Cabin" Josiah Henson

Vælg dit abonnement

  • Over 600.000 titler

  • Download og nyd titler offline

  • Eksklusive titler + Mofibo Originals

  • Børnevenligt miljø (Kids Mode)

  • Det er nemt at opsige når som helst

Flex

For dig som vil prøve Mofibo.

89 kr. /måned
  • 1 konto

  • 20 timer/måned

  • Gem op til 100 ubrugte timer

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Prøv gratis
Den mest populære

Premium

For dig som lytter og læser ofte.

129 kr. /måned
  • 1 konto

  • 100 timer/måned

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Unlimited

For dig som lytter og læser ubegrænset.

149 kr. /måned
  • 1 konto

  • Ubegrænset adgang

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Family

For dig som ønsker at dele historier med familien.

Fra 179 kr. /måned
  • 2-6 konti

  • 100 timer/måned pr. konto

  • Fri lytning til podcasts

  • Kun 39 kr. pr. ekstra konto

  • Ingen binding

2 konti

179 kr. /måned
Start tilbuddet