Saved in:
Main Authors: | , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Birmingham
Packt Publishing
2025
|
Edition: | Second edition. |
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781835889824/?ar |
Summary: | Learn how to use Ghidra to analyze your code for potential vulnerabilities and examine both malware and network threats Key Features Make the most of Ghidra on different platforms such as Linux, Windows, and macOS Unlock the potential of plug-ins and extensions for disassembly, assembly, decompilation, and scripting Learn advanced concepts like binary diffing, debugging, unpacking real-world malware samples, and reverse engineering ransomware Purchase of the print or Kindle book includes a free PDF eBook Book Description Written by David ©¹lvarez P©♭rez, a senior malware analyst at Gen Digital Inc., and Ravikant Tiwari, a senior security researcher at Microsoft, with expertise in malware and threat detection, this book is a complete guide to using Ghidra for examining malware, making patches, and customizing its features for your cybersecurity needs. This updated edition walks you through implementing Ghidra's capabilities and automating reverse-engineering tasks with its plugins. You'll learn how to set up an environment for practical malware analysis, use Ghidra in headless mode, and leverage Ghidra scripting to automate vulnerability detection in executable binaries. Advanced topics such as creating Ghidra plugins, adding new binary formats, analyzing processor modules, and contributing to the Ghidra project are thoroughly covered too. This edition also simplifies complex concepts such as remote and kernel debugging and binary diffing, and their practical uses, especially in malware analysis. From unpacking malware to analyzing modern ransomware, you'll acquire the skills necessary for handling real-world cybersecurity challenges. By the end of this Ghidra book, you'll be adept at avoiding potential vulnerabilities in code, extending Ghidra for advanced reverse-engineering, and applying your skills to strengthen your cybersecurity strategies. What you will learn Develop and integrate your own Ghidra extensions Discover how to use Ghidra in headless mode Extend Ghidra for advanced reverse-engineering Perform binary differencing for use cases such as patch and vulnerability analysis Perform debugging locally and in a remote environment Apply your skills to real-world malware analysis scenarios including ransomware analysis and unpacking malware Automate vulnerability detection in executable binaries using Ghidra scripting Who this book is for This book is for software engineers, security researchers, and professionals working in software development and testing who want to deepen their expertise in reverse engineering and cybersecurity. Aspiring malware analysts and vulnerability researchers will also benefit greatly. Prior experience with Java or Python and a foundational understanding of programming is recommended. |
Item Description: | Includes bibliographical references and index |
Physical Description: | 1 online resource (446 pages) color illustrations |
ISBN: | 9781835889824 |
Staff View
MARC
LEADER | 00000nam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-112913555 | ||
003 | DE-627-1 | ||
005 | 20250306143526.0 | ||
007 | cr uuu---uuuuu | ||
008 | 250306s2025 xx |||||o 00| ||eng c | ||
020 | |a 9781835889824 |9 978-1-83588-982-4 | ||
035 | |a (DE-627-1)112913555 | ||
035 | |a (DE-599)KEP112913555 | ||
035 | |a (ORHE)9781835889824 | ||
035 | |a (DE-627-1)112913555 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20250204 | |
100 | 1 | |a Pérez, David Álvarez |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Ghidra software reverse-engineering for beginners |c David Álvarez Pérez, Ravikant Tiwari |
250 | |a Second edition. | ||
264 | 1 | |a Birmingham |b Packt Publishing |c 2025 | |
300 | |a 1 online resource (446 pages) |b color illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Learn how to use Ghidra to analyze your code for potential vulnerabilities and examine both malware and network threats Key Features Make the most of Ghidra on different platforms such as Linux, Windows, and macOS Unlock the potential of plug-ins and extensions for disassembly, assembly, decompilation, and scripting Learn advanced concepts like binary diffing, debugging, unpacking real-world malware samples, and reverse engineering ransomware Purchase of the print or Kindle book includes a free PDF eBook Book Description Written by David ©¹lvarez P©♭rez, a senior malware analyst at Gen Digital Inc., and Ravikant Tiwari, a senior security researcher at Microsoft, with expertise in malware and threat detection, this book is a complete guide to using Ghidra for examining malware, making patches, and customizing its features for your cybersecurity needs. This updated edition walks you through implementing Ghidra's capabilities and automating reverse-engineering tasks with its plugins. You'll learn how to set up an environment for practical malware analysis, use Ghidra in headless mode, and leverage Ghidra scripting to automate vulnerability detection in executable binaries. Advanced topics such as creating Ghidra plugins, adding new binary formats, analyzing processor modules, and contributing to the Ghidra project are thoroughly covered too. This edition also simplifies complex concepts such as remote and kernel debugging and binary diffing, and their practical uses, especially in malware analysis. From unpacking malware to analyzing modern ransomware, you'll acquire the skills necessary for handling real-world cybersecurity challenges. By the end of this Ghidra book, you'll be adept at avoiding potential vulnerabilities in code, extending Ghidra for advanced reverse-engineering, and applying your skills to strengthen your cybersecurity strategies. What you will learn Develop and integrate your own Ghidra extensions Discover how to use Ghidra in headless mode Extend Ghidra for advanced reverse-engineering Perform binary differencing for use cases such as patch and vulnerability analysis Perform debugging locally and in a remote environment Apply your skills to real-world malware analysis scenarios including ransomware analysis and unpacking malware Automate vulnerability detection in executable binaries using Ghidra scripting Who this book is for This book is for software engineers, security researchers, and professionals working in software development and testing who want to deepen their expertise in reverse engineering and cybersecurity. Aspiring malware analysts and vulnerability researchers will also benefit greatly. Prior experience with Java or Python and a foundational understanding of programming is recommended. | ||
650 | 0 | |a Open source software | |
650 | 0 | |a Reverse engineering | |
650 | 0 | |a Computer security | |
650 | 4 | |a Logiciels libres | |
650 | 4 | |a Rétro-ingénierie | |
650 | 4 | |a Sécurité informatique | |
700 | 1 | |a Tiwari, Ravikant |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781835889824/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-112913555 |
---|---|
_version_ | 1833357128268513280 |
adam_text | |
any_adam_object | |
author | Pérez, David Álvarez Tiwari, Ravikant |
author_facet | Pérez, David Álvarez Tiwari, Ravikant |
author_role | aut aut |
author_sort | Pérez, David Álvarez |
author_variant | d a p da dap r t rt |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)112913555 (DE-599)KEP112913555 (ORHE)9781835889824 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Second edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04202nam a22004212c 4500</leader><controlfield tag="001">ZDB-30-ORH-112913555</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20250306143526.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">250306s2025 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781835889824</subfield><subfield code="9">978-1-83588-982-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)112913555</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP112913555</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781835889824</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)112913555</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20250204</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Pérez, David Álvarez</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ghidra software reverse-engineering for beginners</subfield><subfield code="c">David Álvarez Pérez, Ravikant Tiwari</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2025</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (446 pages)</subfield><subfield code="b">color illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Learn how to use Ghidra to analyze your code for potential vulnerabilities and examine both malware and network threats Key Features Make the most of Ghidra on different platforms such as Linux, Windows, and macOS Unlock the potential of plug-ins and extensions for disassembly, assembly, decompilation, and scripting Learn advanced concepts like binary diffing, debugging, unpacking real-world malware samples, and reverse engineering ransomware Purchase of the print or Kindle book includes a free PDF eBook Book Description Written by David ©¹lvarez P©♭rez, a senior malware analyst at Gen Digital Inc., and Ravikant Tiwari, a senior security researcher at Microsoft, with expertise in malware and threat detection, this book is a complete guide to using Ghidra for examining malware, making patches, and customizing its features for your cybersecurity needs. This updated edition walks you through implementing Ghidra's capabilities and automating reverse-engineering tasks with its plugins. You'll learn how to set up an environment for practical malware analysis, use Ghidra in headless mode, and leverage Ghidra scripting to automate vulnerability detection in executable binaries. Advanced topics such as creating Ghidra plugins, adding new binary formats, analyzing processor modules, and contributing to the Ghidra project are thoroughly covered too. This edition also simplifies complex concepts such as remote and kernel debugging and binary diffing, and their practical uses, especially in malware analysis. From unpacking malware to analyzing modern ransomware, you'll acquire the skills necessary for handling real-world cybersecurity challenges. By the end of this Ghidra book, you'll be adept at avoiding potential vulnerabilities in code, extending Ghidra for advanced reverse-engineering, and applying your skills to strengthen your cybersecurity strategies. What you will learn Develop and integrate your own Ghidra extensions Discover how to use Ghidra in headless mode Extend Ghidra for advanced reverse-engineering Perform binary differencing for use cases such as patch and vulnerability analysis Perform debugging locally and in a remote environment Apply your skills to real-world malware analysis scenarios including ransomware analysis and unpacking malware Automate vulnerability detection in executable binaries using Ghidra scripting Who this book is for This book is for software engineers, security researchers, and professionals working in software development and testing who want to deepen their expertise in reverse engineering and cybersecurity. Aspiring malware analysts and vulnerability researchers will also benefit greatly. Prior experience with Java or Python and a foundational understanding of programming is recommended.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Open source software</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Reverse engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels libres</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Rétro-ingénierie</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tiwari, Ravikant</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781835889824/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-112913555 |
illustrated | Illustrated |
indexdate | 2025-05-28T09:46:45Z |
institution | BVB |
isbn | 9781835889824 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (446 pages) color illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2025 |
publishDateSearch | 2025 |
publishDateSort | 2025 |
publisher | Packt Publishing |
record_format | marc |
spelling | Pérez, David Álvarez VerfasserIn aut Ghidra software reverse-engineering for beginners David Álvarez Pérez, Ravikant Tiwari Second edition. Birmingham Packt Publishing 2025 1 online resource (446 pages) color illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index Learn how to use Ghidra to analyze your code for potential vulnerabilities and examine both malware and network threats Key Features Make the most of Ghidra on different platforms such as Linux, Windows, and macOS Unlock the potential of plug-ins and extensions for disassembly, assembly, decompilation, and scripting Learn advanced concepts like binary diffing, debugging, unpacking real-world malware samples, and reverse engineering ransomware Purchase of the print or Kindle book includes a free PDF eBook Book Description Written by David ©¹lvarez P©♭rez, a senior malware analyst at Gen Digital Inc., and Ravikant Tiwari, a senior security researcher at Microsoft, with expertise in malware and threat detection, this book is a complete guide to using Ghidra for examining malware, making patches, and customizing its features for your cybersecurity needs. This updated edition walks you through implementing Ghidra's capabilities and automating reverse-engineering tasks with its plugins. You'll learn how to set up an environment for practical malware analysis, use Ghidra in headless mode, and leverage Ghidra scripting to automate vulnerability detection in executable binaries. Advanced topics such as creating Ghidra plugins, adding new binary formats, analyzing processor modules, and contributing to the Ghidra project are thoroughly covered too. This edition also simplifies complex concepts such as remote and kernel debugging and binary diffing, and their practical uses, especially in malware analysis. From unpacking malware to analyzing modern ransomware, you'll acquire the skills necessary for handling real-world cybersecurity challenges. By the end of this Ghidra book, you'll be adept at avoiding potential vulnerabilities in code, extending Ghidra for advanced reverse-engineering, and applying your skills to strengthen your cybersecurity strategies. What you will learn Develop and integrate your own Ghidra extensions Discover how to use Ghidra in headless mode Extend Ghidra for advanced reverse-engineering Perform binary differencing for use cases such as patch and vulnerability analysis Perform debugging locally and in a remote environment Apply your skills to real-world malware analysis scenarios including ransomware analysis and unpacking malware Automate vulnerability detection in executable binaries using Ghidra scripting Who this book is for This book is for software engineers, security researchers, and professionals working in software development and testing who want to deepen their expertise in reverse engineering and cybersecurity. Aspiring malware analysts and vulnerability researchers will also benefit greatly. Prior experience with Java or Python and a foundational understanding of programming is recommended. Open source software Reverse engineering Computer security Logiciels libres Rétro-ingénierie Sécurité informatique Tiwari, Ravikant VerfasserIn aut |
spellingShingle | Pérez, David Álvarez Tiwari, Ravikant Ghidra software reverse-engineering for beginners Open source software Reverse engineering Computer security Logiciels libres Rétro-ingénierie Sécurité informatique |
title | Ghidra software reverse-engineering for beginners |
title_auth | Ghidra software reverse-engineering for beginners |
title_exact_search | Ghidra software reverse-engineering for beginners |
title_full | Ghidra software reverse-engineering for beginners David Álvarez Pérez, Ravikant Tiwari |
title_fullStr | Ghidra software reverse-engineering for beginners David Álvarez Pérez, Ravikant Tiwari |
title_full_unstemmed | Ghidra software reverse-engineering for beginners David Álvarez Pérez, Ravikant Tiwari |
title_short | Ghidra software reverse-engineering for beginners |
title_sort | ghidra software reverse engineering for beginners |
topic | Open source software Reverse engineering Computer security Logiciels libres Rétro-ingénierie Sécurité informatique |
topic_facet | Open source software Reverse engineering Computer security Logiciels libres Rétro-ingénierie Sécurité informatique |
work_keys_str_mv | AT perezdavidalvarez ghidrasoftwarereverseengineeringforbeginners AT tiwariravikant ghidrasoftwarereverseengineeringforbeginners |