Table of contents :
Table of Contents……Page 2
1.2 Definitions……Page 5
1.3 Typical Examples……Page 6
1.3.2 Hiding Information from Public……Page 7
1.3.4 Computer Applications……Page 10
1.4 Requirements……Page 12
1.6 Ethics……Page 13
1.7 Miscellaneous Information……Page 14
2.1 Programming Languages……Page 16
2.2 Processor Arithmetic……Page 18
2.3 Memory Structure……Page 22
2.3.1 Variables……Page 23
2.3.3 Pointers……Page 24
3.1 Windows API……Page 26
3.2 File System……Page 27
3.3 File Anatomy……Page 28
3.3.1 File Header……Page 29
3.3.2 Into PE Format……Page 31
3.3.3 The PE Header……Page 34
3.3.3.1 Image File Header……Page 36
3.3.3.2 Image Optional Header……Page 38
3.3.4 Section Table……Page 43
3.3.5 Commonly Encountered Sections……Page 51
3.3.6 PE File Imports……Page 59
3.3.7 PE File Exports……Page 62
4.1 Registers……Page 67
4.2 Flag……Page 70
4.3 Memory……Page 71
4.4 Stacks……Page 73
4.5 Interrupts……Page 74
5.1.2 Operation……Page 76
5.2.1 Description……Page 77
5.2.3 Opcode Instruction Description……Page 79
5.3.1 Description……Page 81
5.3.2 Operation……Page 82
5.3.3 Opcode Instruction Description……Page 83
5.4.1 Description……Page 84
5.4.2 Operation……Page 85
5.5.2 Operation and Example……Page 88
5.5.3 Opcode Instruction Description……Page 89
5.6.3 Opcode Instruction Description……Page 90
5.7.2 Operation and Example……Page 91
5.8.2 Operation and Example……Page 92
5.8.3 Opcode Instruction Description……Page 93
5.9.1.1 Near Call……Page 94
5.9.1.2 Far Calls in Real-Address or Virtual-8086 Mode……Page 95
5.9.1.3 Far Calls in Protected Mode……Page 96
5.9.1.4 Mixing 16-Bit and 32-Bit Calls……Page 98
5.9.4 MUL: Unsigned Multiply……Page 99
5.9.6 MOV: Move……Page 100
6.1 Installing SoftIce……Page 103
6.2.1 Resizing Panels……Page 105
6.2.2 Panels……Page 106
6.2.4 SoftIce Window……Page 107
6.2.5 Symbols……Page 108
6.3 Breakpoints……Page 109
6.4 Navigation in SoftIce……Page 112
7.1 String Manipulation……Page 114
7.2 Version Stamp……Page 116
7.3 Date Stamp……Page 117
7.4 Icon Resources……Page 118
7.5 Other Tools……Page 119
Reverse engineering in computer applications. Softice Cracking
Free Download
Be the first to review “Reverse engineering in computer applications. Softice Cracking” Cancel reply
You must be logged in to post a review.
Related products
- Technique
The laboratory companion: a practical guide to materials, equipment, and technique
Free Download - Technique
Neural engineering: computation, representation, and dynamics in neurobiological systems
Free Download
Reviews
There are no reviews yet.