
Reversing: Secrets of Reverse Engineering described a long-running seesaw battle launched between reversing and anti-reversing. The author reviewed in detail the advantages and shortcomings of every gesture and motion used by both sides for us as a narrater.
Main Contents
- Reverse engineering to operating system
- Reverse engineering on the .NET platform
- Reversing of file format and network protocol that have not been open
- Legal issues of reverse engineering
- Reverse engineering of copy protection and digital copyright management technologies
- Various technologies to prevent others from implementing reverse engineering to your codes
- Reverse engineering of malicious programs
- The basic principle of the decompiler as well as its effect on the reversing process

Table Of Contents
- Part I Reversing 101 1
- Chapter 1 Foundations 3
- Chapter 2 Low-Level Software 25
- Chapter 3 Windows Fundamentals 69
- Chapter 4 Reversing Tools 109
- Part II Applied Reversing 139
- Chapter 5 Beyond the Documentation 141
- Chapter 6 Deciphering File Formats 199
- Chapter 7 Auditing Program Binaries 243
- Part III Cracking 307
- Chapter 9 Piracy and Copy Protection 309
- Chapter 10 Antireversing Techniques 327
- Chapter 11 Breaking Protections 357
- Part IV Beyond Disassembly 421
- Chapter 12 Reversing .NET 423
- Chapter 13 Decompilation 457
- Appendix A Deciphering Code Structures 479
- Appendix B Understanding Compiled Arithmetic 519
- Appendix C Deciphering Program Data 537
- Appendix D Citations 561
Download URLs
Format | Download | Size |
![]() |
7.04 MB |