- Mastering Reverse Engineering
- Reginald Wong
- 113字
- 2021-06-10 19:40:20
Reporting
While doing analysis, every piece of information should be collected and documented. It is common practice to document a reverse engineered object to help future analysis. An analysis serves as a knowledge base for developers who want to secure their upcoming programs from flaws. For example, a simple input can now be secured by placing bounds validation, which is known about as a result of a prior reverse-engineered program that indicated possible buffer overflow.
A good report answers questions regarding the following:
- How a reversed engineered object works
- When specific behavior triggers
- Why specific codes were used in the program
- Where it was intended to work on
- What the whole program does
推薦閱讀
- Extending Symfony2 Web Application Framework
- 數據恢復方法及案例分析
- 零信任網絡:在不可信網絡中構建安全系統
- Practical Network Scanning
- 安全實戰之滲透測試
- Web安全與攻防入門很輕松(實戰超值版)
- 計算機病毒原理與防范(第2版)
- 網絡運維親歷記 (網絡運維紀實文學)
- 隱私計算
- 網絡安全與攻防入門很輕松(實戰超值版)
- Cybersecurity Threats,Malware Trends,and Strategies
- Metasploit 5.0 for Beginners
- BeagleBone for Secret Agents
- 2023—2024年中國網絡安全發展藍皮書
- 云安全深度剖析:技術原理及應用實踐