- Mastering Reverse Engineering
- Reginald Wong
- 147字
- 2021-06-10 19:40:20
Binary analysis tools
Binary analysis tools are used to parse binary files and extract information about the file. An analyst would be able to identify which applications are able to read or execute the binary. File types are generally identified from their magic header bytes. These Magic Header bytes are usually located at the beginning of a file. For example, a Microsoft executable file, an EXE file, begin with the MZ header (MZ is believed to be the initials of Mark Zbikowski, a developer from Microsoft during the DOS days). Microsoft Office Word documents, on the other hand, have these first four bytes as their Magic Header:
The hexadecimal bytes in the preceding screenshot read as DOCFILE Other information such as text string also give hints. The following screenshot shows information indicating that the program was most likely built using Window Forms:
- RESTful Java Web Services Security
- CTF實戰(zhàn):技術(shù)、解題與進階
- INSTANT Netcat Starter
- Kali Linux Social Engineering
- Rootkit和Bootkit:現(xiàn)代惡意軟件逆向分析和下一代威脅
- 暗戰(zhàn)亮劍:黑客滲透與防御全程實錄
- 防火墻技術(shù)與應(yīng)用(第2版)
- API安全技術(shù)與實戰(zhàn)
- 人工智能安全(精裝版)
- 網(wǎng)絡(luò)用戶行為的安全可信分析與控制
- 黑客攻防從入門到精通
- 物聯(lián)網(wǎng)信息安全技術(shù)
- 云計算安全:關(guān)鍵技術(shù)、原理及應(yīng)用
- 安全網(wǎng)絡(luò)構(gòu)建
- 網(wǎng)絡(luò)入侵檢測系統(tǒng)原理與應(yīng)用