Going beyond the issues of analyzing and optimizing programs as well as creating the means of protecting information, this guide takes on the programming problem of how to go about disassembling a program with holes without its source code. Detailing hacking methods used to analyze programs using a debugger and disassembler such as virtual functions, local and global variables, branching, loops, objects and their hierarchy, and mathematical operators, this guide covers methods of fighting disassemblers, self-modifying code in operating systems, and executing code in the stack. Advanced disassembler topics such as optimizing compilers and movable code are discussed as well, and a CD-ROM that contains illustrations and the source codes for the programs is also included.Summary Table of Emulator Characteristics Table 3.1. The main characteristics of popular emulators (drawbacks are in gray) DOSBox Bochs Microsoft VMware Xen Parallels Virtual PC Server Workstation Creator Peter Kevin Microsottanbsp;...
|Title||:||Hacker Disassembling Uncovered, 2nd ed|
|Publisher||:||БХВ-Петербург - 2007|