The Ghidra book: the definitive guide
A guide to using the Ghidra software reverse engineering tool suite. The ability to analyze software with a disassembler is a crucial reverse engineering skill and one of the core competencies expected of malware analysts and software security researchers. Ghidra is one of the world's most capa...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
San Francisco
No Starch Press
[2020]
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781098125684/?ar |
Zusammenfassung: | A guide to using the Ghidra software reverse engineering tool suite. The ability to analyze software with a disassembler is a crucial reverse engineering skill and one of the core competencies expected of malware analysts and software security researchers. Ghidra is one of the world's most capable disassemblers, and it's the only one that includes an environment for collaborative reverse engineering. Ghidra is also a comprehensive open source tool suite and a powerful alternative to the commercial competitors that come with a hefty price tag and steep learning curve. The Ghidra Book teaches you how to use Ghidra to answer the hardest problems about software behavior. It is a tutorial about Ghidra's features that includes instructions on how to use and modify the open source software to make it meet the needs of any individual or organization. The book begins with some background on the reverse engineering process. You are then introduced to important Ghidra features together with examples showing how to customize and augment the suite. You'll learn how to: Navigate a disassembly Use Ghidra's built-in decompiler to expedite analysis Analyze obfuscated binaries Extend Ghidra to recognize new data types Build new Ghidra analyzers Build new Ghidra loaders Add support for new processors and instruction sets Script Ghidra tasks to automate workflows Set up and use a collaborative reverse engineering environment By the end of the book, you will have learned how to use Ghidra efficiently and maximize its effectiveness. |
Beschreibung: | Includes index. - Online resource; title from digital title page (viewed on December 18, 2020) |
Umfang: | 1 Online-Ressource (1 volume) illustrations |
ISBN: | 9781718501034 171850103X |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-056584008 | ||
003 | DE-627-1 | ||
005 | 20240228121210.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200916s2020 xx |||||o 00| ||eng c | ||
020 | |a 9781718501034 |c electronic book |9 978-1-7185-0103-4 | ||
020 | |a 171850103X |c electronic book |9 1-7185-0103-X | ||
035 | |a (DE-627-1)056584008 | ||
035 | |a (DE-599)KEP056584008 | ||
035 | |a (ORHE)9781098125684 | ||
035 | |a (DE-627-1)056584008 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.45 |2 23 | |
100 | 1 | |a Eagle, Chris |e VerfasserIn |4 aut | |
245 | 1 | 4 | |a The Ghidra book |b the definitive guide |c by Chris Eagle and Kara Nance |
264 | 1 | |a San Francisco |b No Starch Press |c [2020] | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Online resource; title from digital title page (viewed on December 18, 2020) | ||
520 | |a A guide to using the Ghidra software reverse engineering tool suite. The ability to analyze software with a disassembler is a crucial reverse engineering skill and one of the core competencies expected of malware analysts and software security researchers. Ghidra is one of the world's most capable disassemblers, and it's the only one that includes an environment for collaborative reverse engineering. Ghidra is also a comprehensive open source tool suite and a powerful alternative to the commercial competitors that come with a hefty price tag and steep learning curve. The Ghidra Book teaches you how to use Ghidra to answer the hardest problems about software behavior. It is a tutorial about Ghidra's features that includes instructions on how to use and modify the open source software to make it meet the needs of any individual or organization. The book begins with some background on the reverse engineering process. You are then introduced to important Ghidra features together with examples showing how to customize and augment the suite. You'll learn how to: Navigate a disassembly Use Ghidra's built-in decompiler to expedite analysis Analyze obfuscated binaries Extend Ghidra to recognize new data types Build new Ghidra analyzers Build new Ghidra loaders Add support for new processors and instruction sets Script Ghidra tasks to automate workflows Set up and use a collaborative reverse engineering environment By the end of the book, you will have learned how to use Ghidra efficiently and maximize its effectiveness. | ||
630 | 2 | 0 | |a Ghidra (Electronic resource) |
650 | 0 | |a Disassemblers (Computer programs) | |
650 | 0 | |a Debugging in computer science | |
650 | 0 | |a Computer security |x Computer programs | |
650 | 0 | |a Reverse engineering |x Computer programs | |
650 | 4 | |a Désassembleurs (Logiciels) | |
650 | 4 | |a Débogage | |
650 | 4 | |a Sécurité informatique ; Logiciels | |
650 | 4 | |a Rétro-ingénierie ; Logiciels | |
650 | 4 | |a COMPUTERS ; Languages ; Assembly Language | |
650 | 4 | |a Computer security ; Computer programs | |
650 | 4 | |a Debugging in computer science | |
650 | 4 | |a Disassemblers (Computer programs) | |
700 | 1 | |a Nance, Kara |e VerfasserIn |4 aut | |
776 | 1 | |z 9781718501027 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781718501027 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781098125684/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-056584008 |
---|---|
_version_ | 1821494837922234368 |
adam_text | |
any_adam_object | |
author | Eagle, Chris Nance, Kara |
author_facet | Eagle, Chris Nance, Kara |
author_role | aut aut |
author_sort | Eagle, Chris |
author_variant | c e ce k n kn |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)056584008 (DE-599)KEP056584008 (ORHE)9781098125684 |
dewey-full | 005.45 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.45 |
dewey-search | 005.45 |
dewey-sort | 15.45 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03540cam a22005412 4500</leader><controlfield tag="001">ZDB-30-ORH-056584008</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121210.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200916s2020 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781718501034</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-7185-0103-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">171850103X</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-7185-0103-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)056584008</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP056584008</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781098125684</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)056584008</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.45</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Eagle, Chris</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The Ghidra book</subfield><subfield code="b">the definitive guide</subfield><subfield code="c">by Chris Eagle and Kara Nance</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">San Francisco</subfield><subfield code="b">No Starch Press</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Online resource; title from digital title page (viewed on December 18, 2020)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">A guide to using the Ghidra software reverse engineering tool suite. The ability to analyze software with a disassembler is a crucial reverse engineering skill and one of the core competencies expected of malware analysts and software security researchers. Ghidra is one of the world's most capable disassemblers, and it's the only one that includes an environment for collaborative reverse engineering. Ghidra is also a comprehensive open source tool suite and a powerful alternative to the commercial competitors that come with a hefty price tag and steep learning curve. The Ghidra Book teaches you how to use Ghidra to answer the hardest problems about software behavior. It is a tutorial about Ghidra's features that includes instructions on how to use and modify the open source software to make it meet the needs of any individual or organization. The book begins with some background on the reverse engineering process. You are then introduced to important Ghidra features together with examples showing how to customize and augment the suite. You'll learn how to: Navigate a disassembly Use Ghidra's built-in decompiler to expedite analysis Analyze obfuscated binaries Extend Ghidra to recognize new data types Build new Ghidra analyzers Build new Ghidra loaders Add support for new processors and instruction sets Script Ghidra tasks to automate workflows Set up and use a collaborative reverse engineering environment By the end of the book, you will have learned how to use Ghidra efficiently and maximize its effectiveness.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Ghidra (Electronic resource)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Disassemblers (Computer programs)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Debugging in computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Computer programs</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Reverse engineering</subfield><subfield code="x">Computer programs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Désassembleurs (Logiciels)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Débogage</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Logiciels</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Rétro-ingénierie ; Logiciels</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Languages ; Assembly Language</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Computer programs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Debugging in computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Disassemblers (Computer programs)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nance, Kara</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781718501027</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781718501027</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781098125684/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-056584008 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:44Z |
institution | BVB |
isbn | 9781718501034 171850103X |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | No Starch Press |
record_format | marc |
spelling | Eagle, Chris VerfasserIn aut The Ghidra book the definitive guide by Chris Eagle and Kara Nance San Francisco No Starch Press [2020] 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Online resource; title from digital title page (viewed on December 18, 2020) A guide to using the Ghidra software reverse engineering tool suite. The ability to analyze software with a disassembler is a crucial reverse engineering skill and one of the core competencies expected of malware analysts and software security researchers. Ghidra is one of the world's most capable disassemblers, and it's the only one that includes an environment for collaborative reverse engineering. Ghidra is also a comprehensive open source tool suite and a powerful alternative to the commercial competitors that come with a hefty price tag and steep learning curve. The Ghidra Book teaches you how to use Ghidra to answer the hardest problems about software behavior. It is a tutorial about Ghidra's features that includes instructions on how to use and modify the open source software to make it meet the needs of any individual or organization. The book begins with some background on the reverse engineering process. You are then introduced to important Ghidra features together with examples showing how to customize and augment the suite. You'll learn how to: Navigate a disassembly Use Ghidra's built-in decompiler to expedite analysis Analyze obfuscated binaries Extend Ghidra to recognize new data types Build new Ghidra analyzers Build new Ghidra loaders Add support for new processors and instruction sets Script Ghidra tasks to automate workflows Set up and use a collaborative reverse engineering environment By the end of the book, you will have learned how to use Ghidra efficiently and maximize its effectiveness. Ghidra (Electronic resource) Disassemblers (Computer programs) Debugging in computer science Computer security Computer programs Reverse engineering Computer programs Désassembleurs (Logiciels) Débogage Sécurité informatique ; Logiciels Rétro-ingénierie ; Logiciels COMPUTERS ; Languages ; Assembly Language Computer security ; Computer programs Nance, Kara VerfasserIn aut 9781718501027 Erscheint auch als Druck-Ausgabe 9781718501027 |
spellingShingle | Eagle, Chris Nance, Kara The Ghidra book the definitive guide Ghidra (Electronic resource) Disassemblers (Computer programs) Debugging in computer science Computer security Computer programs Reverse engineering Computer programs Désassembleurs (Logiciels) Débogage Sécurité informatique ; Logiciels Rétro-ingénierie ; Logiciels COMPUTERS ; Languages ; Assembly Language Computer security ; Computer programs |
title | The Ghidra book the definitive guide |
title_auth | The Ghidra book the definitive guide |
title_exact_search | The Ghidra book the definitive guide |
title_full | The Ghidra book the definitive guide by Chris Eagle and Kara Nance |
title_fullStr | The Ghidra book the definitive guide by Chris Eagle and Kara Nance |
title_full_unstemmed | The Ghidra book the definitive guide by Chris Eagle and Kara Nance |
title_short | The Ghidra book |
title_sort | ghidra book the definitive guide |
title_sub | the definitive guide |
topic | Ghidra (Electronic resource) Disassemblers (Computer programs) Debugging in computer science Computer security Computer programs Reverse engineering Computer programs Désassembleurs (Logiciels) Débogage Sécurité informatique ; Logiciels Rétro-ingénierie ; Logiciels COMPUTERS ; Languages ; Assembly Language Computer security ; Computer programs |
topic_facet | Ghidra (Electronic resource) Disassemblers (Computer programs) Debugging in computer science Computer security Computer programs Reverse engineering Computer programs Désassembleurs (Logiciels) Débogage Sécurité informatique ; Logiciels Rétro-ingénierie ; Logiciels COMPUTERS ; Languages ; Assembly Language Computer security ; Computer programs |
work_keys_str_mv | AT eaglechris theghidrabookthedefinitiveguide AT nancekara theghidrabookthedefinitiveguide AT eaglechris ghidrabookthedefinitiveguide AT nancekara ghidrabookthedefinitiveguide |