Programming Linux Anti-Reversing Techniques
Programming Linux Anti-Reversing Techniques
About the Book
Unlike many reverse engineering books, Programming Linux Anti-Reversing Techniques provides working code so that the reader can better understand how anti reverse engineering techniques are generated and analyzed. The code starts off as a very straight forward C bind shell that gets modified throughout the book. Each chapter shows the reader how a reverse engineer might look at a binary and how to frustrate that analysis.
Table of Contents
-
Preface
- Why Read This Book?
- Topics Not Covered
- Prerequisites
- Code and Command Output
-
Chapter 1: Introductions
- Introducing “Trouble”
- Using CMake
- The Code
- Compiling
- Executing
- Accessing the Shell
-
Chapter 2: Compiler Options
-
-g
- Recovering the Bind Shell Password with Hexdump
- Recovering the Bind Shell Password with GDB
- The Debugging Information in IDA
- Removing the Debugging Information
- Case Study: XOR DDOS
-
-s
- SYMTAB vs. DYNSYM
- Finding the Bind Shell Password Using .symtab
- Case Study: The FILE Symbol
- Examing Trouble After -s
-
-fvisibility
- Looking at FUNC symbols
- Hiding FUNC symbols
-
-O
- Corrected Block Tiny Encryption Algorithm (XXTEA)
- -Os
- -O3
- -funroll-loops
-
-static
- Resolving Functions at Runtime
- ltrace
- LD_PRELOAD
- Using musl
-
-g
-
Chapter 3: File Format Hacks
- The Strip Utility
- Removing the Section Headers Table
- Little Endian or Big Endian?
-
The Sections Are a Lie
- Flipping the Executable Bit
- Lying with .init
- Hiding the Entry Point
- Mixing the Symbols
-
Chapter 4: Fighting Off String Analysis
- Code Reorganization
- Stack Strings
- XOR Stack String
-
Function Encryption
- Computing the Function’s Size Using a Linker Script
- Decryption Logic
- Encryption Logic
-
Creating a Cryptor
- Implementing the Cryptor
- Analyzing the Cryptor
-
Chapter 5: Obstructing Code Flow Analysis
- Indirect Function Calls
- Signals
- Early Return
- Jump Over an Invalid Byte
- Jump! Jump!
- Always Follow the Conditional
- Overlapping Instructions
-
Chapter 6: Evading the Debugger
- Trace Me
- Trapping the Debugger
- Becoming Attached
- madvise
- prctl
- Detection Before main()
- Computing Function Checksums
- Conclusion: All That We Fall For
- Notes
The Leanpub 60 Day 100% Happiness Guarantee
Within 60 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.
Now, this is technically risky for us, since you'll have the book or course files either way. But we're so confident in our products and services, and in our authors and readers, that we're happy to offer a full money back guarantee for everything we sell.
You can only find out how good something is by trying it, and because of our 100% money back guarantee there's literally no risk to do so!
So, there's no reason not to click the Add to Cart button, is there?
See full terms...
Earn $8 on a $10 Purchase, and $16 on a $20 Purchase
We pay 80% royalties on purchases of $7.99 or more, and 80% royalties minus a 50 cent flat fee on purchases between $0.99 and $7.98. You earn $8 on a $10 sale, and $16 on a $20 sale. So, if we sell 5000 non-refunded copies of your book for $20, you'll earn $80,000.
(Yes, some authors have already earned much more than that on Leanpub.)
In fact, authors have earnedover $14 millionwriting, publishing and selling on Leanpub.
Learn more about writing on Leanpub
Free Updates. DRM Free.
If you buy a Leanpub book, you get free updates for as long as the author updates the book! Many authors use Leanpub to publish their books in-progress, while they are writing them. All readers get free updates, regardless of when they bought the book or how much they paid (including free).
Most Leanpub books are available in PDF (for computers) and EPUB (for phones, tablets and Kindle). The formats that a book includes are shown at the top right corner of this page.
Finally, Leanpub books don't have any DRM copy-protection nonsense, so you can easily read them on any supported device.
Learn more about Leanpub's ebook formats and where to read them