FOREWORDACKNOWLEDGMENTSINTRODUCTIONPart I: INTRODUCTION TO IDA* Chapter 1: INTRODUCTION TO DISASSEMBLY* Chapter 2: REVERSING AND DISASSEMBLY TOOLS* Chapter 3: IDA PRO BACKGROUNDPart II: BASIC IDA USAGE* Chapter 4: GETTING STARTED WITH IDA* Chapter 5: IDA DATA DISPLAYS* Chapter 6: DISASSEMBLY NAVIGATION* Chapter 7: DISASSEMBLY MANIPULATION* Chapter 8: DATATYPES AND DATA STRUCTURES* Chapter 9: CROSS-REFERENCES AND GRAPHING* Chapter 10: THE MANY FACES OF IDAPart III: ADVANCED IDA USAGE* Chapter 11: CUSTOMIZING IDA* Chapter 12: Library Recognition Using FLIRT Signatures* Chapter 13: Extending IDA's Knowledge* Chapter 14: PATCHING BINARIES AND OTHER IDA LIMITATIONSPart IV: EXTENDING IDA'S CAPABILITIES* Chapter 15: SCRIPTING WITH IDC* Chapter 16: THE IDA SOFTWARE DEVELOPMENT KIT* Chapter 17: THE IDA PLUG-IN ARCHITECTURE* Chapter 18: BINARY FILES AND IDA LOADER MODULES* Chapter 19: IDA PROCESSOR MODULESPart V: REAL-WORLD APPLICATIONS* Chapter 20: COMPILER VARIATIONS* Chapter 21: OBFUSCATED CODE ANALYSIS* Chapter 22: VULNERABILITY ANALYSIS* Chapter 23: REAL-WORLD IDA PLUG-INSPart VI: THE IDA DEBUGGER* Chapter 24: THE IDA DEBUGGER* Chapter 25: DISASSEMBLER/DEBUGGER INTEGRATION* Chapter 26: LINUX, OS X, AND REMOTE DEBUGGING WITH IDA* USING IDA FREEWARE 4.9* IDC/SDK CROSS-REFERENCE* WHAT'S NEW IN IDA 5.3COLOPHON
Chris Eagle is a Senior Lecturer of Computer Science at the Naval Postgraduate School in Monterey, CA. He is the author of many IDA plug-ins and co-author of Gray Hat Hacking, and he has spoken at numerous security conferences, including Black Hat, Defcon, ToorCon, and ShmooCon.
Ask a Question About this Product More... |