This is the code repository for Binary Analysis Cookbook , published by Packt.
Actionable recipes for disassembling and analyzing binaries for security risks
Binary analysis is the process of examining a binary program to determine information security actions. It is a complex, constantly evolving, and challenging topic that crosses over into several domains of information technology and security.
This book covers the following exciting features:
- Traverse the IA32, IA64, and ELF specifications
- Explore Linux tools to disassemble ELF binaries
- Identify vulnerabilities in 32-bit and 64-bit binaries
- Discover actionable solutions to overcome the limitations in analyzing ELF binaries
- Interpret the output of Linux tools to identify security risks in binaries
- Understand how dynamic taint analysis works
If you feel this book is for you, get your copy today!
All of the code is organized into folders. For example, Chapter02.
The code will look like the following:
; MUL examples
mul edi
mul bx
mul cl
Following is what you need for this book: This book is for anyone looking to learn how to dissect ELF binaries using open-source tools available in Linux. If you’re a Linux system administrator or information security professional, you’ll find this guide useful. Basic knowledge of Linux, familiarity with virtualization technologies and the working of network sockets, and experience in basic Python or Bash scripting will assist you with understanding the concepts in this book
With the following software and hardware list you can run all code files present in the book (Chapter 1-10).
Chapter | Software required | Hardware specifications |
---|---|---|
1-10 | Windows, Mac, Linux | Laptop or desktop with the following: Intel Processor, 8GB RAM (16GB or more preferred), 250 GB or more HDD/SSD |
We also provide a PDF file that has color images of the screenshots/diagrams used in this book. Click here to download it.
Michael Born is a senior security consultant for SecureSky, Inc. Michael has earned several industry certifications and has co-taught offensive-focused Python programming classes at OWASP AppSec USA, and AppSec Europe. He enjoys coding in Python, IA32, IA64, PowerShell, participating in, and designing, capture the flag (ctf) challenges, teaching and mentoring others looking to embark on a career in information security, and presenting on various information security topics at local chapters of well-known information security groups. Michael has served on the chapter board for his local OWASP chapter, is a lifetime OWASP member, and participates in the local DC402 group.
Click here if you have any feedback or suggestions.