|
HACKER DEBUGGING UNCOVERED
Tips for the practical use of debuggers, such as NuMega SoftIce, Microsoft Visual Studio Debugger, and Microsoft Kernel Debugger, with minimum binding to a specific environment are disclosed in this debugger guide. How debuggers operate and how to overcome obstacles and repair debuggers is demonstrated. Programmers will learn how to look at what is inside a computer system, how to reconstruct the operating algorithm of a program distributed without source code, how to modify the program, and how to debug drivers. The use of debugging applications and drivers in Windows and Unix operating systems on Intel Pentium/DEC Alpha-based processors is also detailed.
Contents
Part 1: Getting Started With Debugging Tools
Introduction to Debugging Tools
Specific Features of Debugging under UNIX
Emulating Debuggers and Emulators
Applications Analysis Using Bounds Checker
Part 2: Protection Mechanism and Debugging Them
Introduction to Protection Mechanisms
Getting Acquainted with the Debugger
IDA Emerges on the Scene
The TAO of Registration Protection Mechanisms
Hashing and How to overcome it
Popular Protection Mechanisms Used in demo Versions
Part 3: Antidebugging Techniques
Introduction to antidebugging Techniques
Implicit Contructor Call
Unix -Specific Antidebugging Techniques
Self-Modifying Code
Using Implicit Self-Control
To Create Uncrackable Protection
Mental Debugging
Software Protection
how to Make Your Programs More Reliable
Software Testing
Part 4: Critical Errors of Applications and Operating System
Introduction to Critical Errors of Application and OS
Inhabitants of the Somber Zone or From Moregue to Reanimation
Part 5: PE Files
Techniques for Inserting and Removing Code Into/from PE files
Publisher BPB
Author Kaspersky
Price INR Rs. 399.00
|