Reverse Engineering Windows Applications [ru]

Hero Member
Infinity Member
Joined
Nov 19, 2023
Messages
2,718
Reaction score
24,248
Points
113
89de0041947e724e32155a227ac5103f.jpg


Reverse engineering is considered one of the most complex areas in information security (IS). In the book, the author offers to lift the veil of secrecy over this topic and, using practical examples, consider how applications work under Windows OS, as well as understand how to exploit buffer overflow vulnerabilities, place your code in executable files, find useful information in memory dumps, and much more.
The book is intended for both novice specialists who want to understand reverse engineering and experienced IS specialists interested in this topic.







To see this hidden content, you must reply and react with one of the following reactions : Like Like, Love Love, Haha Haha, Wow Wow
 
  • Like
Reactions: dynamike, registerdna and desertsand43
Member
Joined
Jul 7, 2024
Messages
8
Reaction score
1
Points
3
l
89de0041947e724e32155a227ac5103f.jpg


Reverse engineering is considered one of the most complex areas in information security (IS). In the book, the author offers to lift the veil of secrecy over this topic and, using practical examples, consider how applications work under Windows OS, as well as understand how to exploit buffer overflow vulnerabilities, place your code in executable files, find useful information in memory dumps, and much more.
The book is intended for both novice specialists who want to understand reverse engineering and experienced IS specialists interested in this topic.







[Hidden content]
plp
 
Advanced Member
Joined
Jul 29, 2024
Messages
127
Reaction score
5
Points
18
89de0041947e724e32155a227ac5103f.jpg


Reverse engineering is considered one of the most complex areas in information security (IS). In the book, the author offers to lift the veil of secrecy over this topic and, using practical examples, consider how applications work under Windows OS, as well as understand how to exploit buffer overflow vulnerabilities, place your code in executable files, find useful information in memory dumps, and much more.
The book is intended for both novice specialists who want to understand reverse engineering and experienced IS specialists interested in this topic.







[Hidden content]
 
Member
Joined
Aug 2, 2024
Messages
11
Reaction score
0
Points
1
89de0041947e724e32155a227ac5103f.jpg
Reverse engineering is considered one of the most complex areas in information security (IS). In the book, the author offers to lift the veil of secrecy over this topic and, using practical examples, consider how applications work under Windows OS, as well as understand how to exploit buffer overflow vulnerabilities, place your code in executable files, find useful information in memory dumps, and much more. The book is intended for both novice specialists who want to understand reverse engineering and experienced IS specialists interested in this topic.
[Hidden content]
89de0041947e724e32155a227ac5103f.jpg
Reverse engineering is considered one of the most complex areas in information security (IS). In the book, the author offers to lift the veil of secrecy over this topic and, using practical examples, consider how applications work under Windows OS, as well as understand how to exploit buffer overflow vulnerabilities, place your code in executable files, find useful information in memory dumps, and much more. The book is intended for both novice specialists who want to understand reverse engineering and experienced IS specialists interested in this topic.
[Hidden content]
Toooooop
 

User Who Replied This Thread (Total Members: 3) Show all

  • Tags
    engineering reverse reverse engineering windows
  • Top