- Mastering Reverse Engineering
- Reginald Wong
- 113字
- 2021-06-10 19:40:20
Reporting
While doing analysis, every piece of information should be collected and documented. It is common practice to document a reverse engineered object to help future analysis. An analysis serves as a knowledge base for developers who want to secure their upcoming programs from flaws. For example, a simple input can now be secured by placing bounds validation, which is known about as a result of a prior reverse-engineered program that indicated possible buffer overflow.
A good report answers questions regarding the following:
- How a reversed engineered object works
- When specific behavior triggers
- Why specific codes were used in the program
- Where it was intended to work on
- What the whole program does
推薦閱讀
- Android應用安全實戰:Frida協議分析
- Web漏洞分析與防范實戰:卷1
- Mastering Kali Linux for Advanced Penetration Testing
- Penetration Testing with Perl
- 黑客攻防與網絡安全從新手到高手(絕招篇)
- 云原生安全與DevOps保障
- 黑客攻防實戰從入門到精通
- 黑客攻防從入門到精通:命令版
- 網絡入侵檢測系統原理與應用
- Kali Linux無線網絡滲透測試詳解
- ATT&CK與威脅獵殺實戰
- 密碼朋克:自由與互聯網的未來
- 數據恢復技術深度揭秘
- Web前端黑客技術揭秘
- Hands-On Spring Security 5 for Reactive Applications