IDA


As mentioned earlier, a Google search of ida + “4.1 ida pro” download datarescue should provide a list of web pages from which IDA can be downloaded. Once downloaded and installed, IDA can be used to look into Windows applications, libraries, and even device drivers. This tool provides an incredible wealth of information to the experienced user. Unfortunately, becoming an experienced user can be a daunting task. This book will walk you through basic IDA use, but if you intend to write rootkits, you will need to learn much more about IDA. If you already know that reverse engineering will be an important part of your future plans, I would recommend using this book as a primer and then replace the word “download” with the word “tutorial” in the Google search mentioned earlier.




Professional Rootkits
Professional Rootkits (Programmer to Programmer)
ISBN: 0470101547
EAN: 2147483647
Year: 2007
Pages: 229
Authors: Ric Vieler

Similar book on Amazon
Rootkits: Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel
A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core
Reversing: Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net