Books: 3

Reverse Engineering

CoverTitleYear
Developing Autonomous Bots for Online Games
You don't need to be a wizard to transform a game you like into a game you love. Imagine if you could give your favorite PC game a more informative heads-up display or instantly collect all that loot from your latest epic battle. Bring your knowledge of Windows-based development and memory management, more » and Game Hacking will teach you what you need to become a true game hacker. Learn the basics, like reverse engineering, assembly code analysis, programmatic memory manipulation, and code injection, and hone your new skills with hands-on example code and practice binaries.Level up as you learn how to: * Scan and modify memory with Cheat Engine * Explore program structure and execution flow with OllyDbg * Log processes and pinpoint useful data files with Process Monitor * Manipulate control flow through NOPing, hooking, and more * Locate and dissect common game memory structures You'll even discover the secrets behind common game bots, including: * Extrasensory perception hacks, such as wallhacks and heads-up displays * Responsive hacks, such as autohealers and combo bots * Bots with artificial intelligence, such as cave walkers and automatic looters Game hacking might seem like black magic, but it doesn't have to be. Once you understand how bots are made, you'll be better positioned to defend against them in your own games. Journey through the inner workings of PC games with Game Hacking, and leave with a deeper understanding of both game design and computer security. « less
2016
A Definitive Guide to iOS Security
When it comes to security, iOS has been in the spotlight for a variety of reasons. Although a tough system to manipulate, there are still critical security bugs that can be exploited. In response to this issue, author Kunal Relan offers a concise, deep dive into iOS Security, including all the tools more » and methods to master reverse engineering of iOS apps and penetration testing.iOS Penetration Testing covers the most significant attacks threatening iOS applications in recent times. The readers will also learn methods of patching iOS applications to make payment transactions and personal data sharing more secure. What you will learn: • Get a deeper understanding of iOS Infrastructure and Architecture • Obtain deep insights of iOS Security and Jailbreaking • Learn Reverse Engineering techniques for securing your iOS Apps • Learn the basics of Application Development for iOS• Security Best Practices of iOS applications Who is this book for: The target audience of this book will be the Security Professionals, informationSecurity analysts, iOS Reverse Engineers , iOS Developers and readers interested in secure application development in iOS. « less
2016
As a 5-year n00b, this is my gift to the jailbreak community, enjoy! iOS App Reverse Engineering is the world's 1st book of very detailed iOS App reverse engineering skills, targeting 4 kinds of readers: * iOS enthusiasts; * Senior iOS developers, who have good command of App development and have more » the desire to understand iOS better; * Architects. During the process of reverse engineering, they can learn architectures of those excellent Apps so that they can improve their ability of architecture design; * Reverse engineers in other systems who’re also interested in iOS. The book consists of 4 parts, i.e. concepts, tools, theories and practices. The book follows an "abstraction, concrete, abstraction, concrete" structure, starting from basic concepts like iOS filesystem hierarchy and iOS file types that Apple didn't expose to App developers but iOS (jailbreak) researchers should know, then goes through the most commonly used tools like class-dump, Theos, Cycript, Reveal, IDA and LLDB to introduce what to do in iOS reverse engineering. After that, iOS reverse engineering theories based on Objective-C and ARM assembly are explained in a methodological way, pointing out the core of this book. Last but not least, 4 originally elaborated practices are there to cover all previous contents of the book and give you the most intuitive perception of iOS reverse engineering. Happy hacking! « less
2015