среда, 8 февраля 2017 г.

The Antivirus Hacker's Handbook




http://wormholetravel.net/darkside.html

With this book, you can increase your knowledge about antivirus products and reverse-engineering in general; while the reverse-engineering techniques and tools discussed in this book are applied to antivirus software, they can also be used with any other software products. Security researchers, penetration testers, and other information security professionals can benefi t from this book. Antivirus developers will benefit as well because they will learn more about how antivirus products are analyzed, how they can be broken into parts, and how to prevent it from being broken or make it harder to break. I want to stress that although this book is, naturally, focused on antivirus products, it also contains practical examples that show how to apply reverse-engineering, vulnerability discovery, and exploitation techniques to real-world applications.

This book is designed for individuals who need to better understand the functionality of antivirus products, regardless of which side of the fence they are on: offensive or defensive. Its objective is to help you learn when and how specific techniques and tools should be used and what specifi c parts of antivirus products you should focus on, based on the specifi c tasks you want to accomplish.
This book is for you if any of the following statements are true:
■ You want to learn more about the security of antivirus products.
■ You want to learn more about reverse-engineering, perhaps with the aim of reverse-engineering antivirus products.
■ You want to bypass antivirus software.
■ You want to break antivirus software into pieces.
■ You want to write exploits for antivirus software.
■ You want to evaluate antivirus products.
■ You want to increase the overall security of your own antivirus products,
or you want to know how to write security-aware code that will deal with
hostile code.
■ You love to tinker with code, or you want to expand your skills and
knowledge in the information security field.

Комментариев нет:

Отправить комментарий