《逆向工程资源》(Reverse Engineering)

http://emule.cdp2p.com/Article/info/b8/200604/Article_37023.html

反向工程:
软件的"反向工程”,或称"逆向工程”,是指对软件的结构、流程、算法、代码等进行逆向拆解和分析。在原创者不愿公布硬件或软件产品的上述技术特征的情况下,竞争者可以利用"反向工程”进行仿制生产,而配套产品生产者则也希望通过"反向工程”生产出在技术上与原产品兼容的设备。由于"反向工程”可导致原产品的核心技术被他人知晓,因此掌握先进技术的软件开发者往往需要在其产品中加入防止"反向工程”的技术措施。
在新窗口打开图片
In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in detail the five most important disciplines for security professionals and software developers: Coding, Sockets, Shellcode, Porting Applications, and Coding Security Tools.

"Read every page of this book, understand the content, and use it to your advantage."--Stuart McClure


Download the CodeAll code lines throughout the book are numbered for easy reference and are available for download from www.syngress.com/solutions.

Develop ShellcodeCustomize and optimize never-before-seen shellcode that can exploit almost any system.

Port Public ExploitsFollow step-by-step instructions for porting exploits to work on Windows, Linux, UNIX, and even Macs!

Customize Windows COM ObjectsWrap and automate pre-compiled exploits and security tools such as Nmap, netcat, and hping.

Enhance NiktoDevelop customized code to dramatically improve the performance of the Nikto Web server scanner.

Reverse Engineer Zero DaysLearn to reverse engineer, modify, and re-automate Zero-Day exploit code.

Write NASL ScriptsDevelop scripts for Nessus to discover the latest vulnerabilities.

Identify and Target VulnerabilitiesExamine case studies that reveal how attackers identify and exploit security holes.

Master SocketsDetailed code examples demonstrate socket initialization, closing sockets, reading and writing data.
Your Solutions Membership Gives You Access to:

A comprehensive FAQ page that consolidates all of the key points of this book into an easy-to-search Web page

"From the Author" Forum where the authors post timely updates and links to related sites

The complete code listings from the book

Downloadable chapters from these best-selling books:

Buffer Overflow Attacks: Detect, Exploit, Prevent

Programmer's Ultimate Security DeskRef

Hacking the Code: ASP.NET Web Application Security

Nessus Network Auditing

在新窗口打开图片

Book Description
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.
* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products
* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware
* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language


Tool Pack
- System Tools
Windows system variables
Scripting tool kit
Registry Patches Creator
Registry Docs
Reg& REGINI
Reg-Cracking-Engine
MCI doc
Elevate permission application launcher
Dos Batch Programming Guide
CMD Tools
CMD Basic Help

- Other Tools
WinCRC32
Sysinternals process explorer
Systinternals ntregmon
Systinternals ntfilmon
Setup Builder
Scooter Beyond Compare
Rar 3.2 command Line
Install Rite
Evidence Mini HTML Browser
Advance Crc Utility
7 Zip 2.3

- DIZ, Info, Txt Tools
txt2exe
terminal fonts
legacy file
flyingcode NFO viewer
eminence NFO viewer
elton's NFO

- Cracking Tools
WinHEX
W32Dasm
stup_PE
SoftICE
revirgin
ProcDump32
PE Explorer
Patch Maker
IDA to SoftICE symbol loader
FCTR UFX GUI
Datarescue IDA PRO
 

下面是 eMule 专用的下载链接,您必须安装 eMule 才能点击下载
[逆向工程资源].Syngress.Sockets.Shellcode.Porting.And.Coding.Reverse.Engineering.Exploits.And.Tool.Coding.For.Security.Professionals.pdf112.33 M
[逆向工程资源].Secrets.of.Reverse.Engineering.pdf8.56 M
[逆向工程资源].Reverse.Engineering.Tools.Pack.rar42.21 M
全选  

  • 0
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
public class GeneratorSqlmap { public void generator() throws Exception{ List<String> warnings = new ArrayList<String>(); boolean overwrite = true; //指定 逆向工程配置文件 File configFile = new File("generatorConfig.xml"); ConfigurationParser cp = new ConfigurationParser(warnings); Configuration config = cp.parseConfiguration(configFile); DefaultShellCallback callback = new DefaultShellCallback(overwrite); MyBatisGenerator myBatisGenerator = new MyBatisGenerator(config, callback, warnings); myBatisGenerator.generate(null); } public static void main(String[] args) throws Exception { try { GeneratorSqlmap generatorSqlmap = new GeneratorSqlmap(); generatorSqlmap.generator(); } catch (Exception e) { e.printStackTrace(); } } } <!-- 默认false,把JDBC DECIMAL 和 NUMERIC 类型解析为 Integer,为 true时把JDBC DECIMAL 和 NUMERIC 类型解析为java.math.BigDecimal --> <javaTypeResolver> <property name="forceBigDecimals" value="false" /> </javaTypeResolver> <!-- targetProject:生成PO类的位置 --> <javaModelGenerator targetPackage="cn.itcast.ssm.po" targetProject=".\\src"> <!-- enableSubPackages:是否让schema作为包的后缀 --> <property name="enableSubPackages" value="false" /> <!-- 从数据库返回的值被清理前后的空格 --> <property name="trimStrings" value="true" /> </javaModelGenerator> <!-- targetProject:mapper映射文件生成的位置 --> <sqlMapGenerator targetPackage="cn.itcast.ssm.mapper" targetProject=".\\src"> <!-- enableSubPackages:是否让schema作为包的后缀 --> <property name="enableSubPackages" value="false" /> </sqlMapGenerator> <!-- targetPackage:mapper接口生成的位置 --> <javaClientGenerator type="XMLMAPPER" targetPackage="cn.itcast.ssm.mapper" targetProject=".\\src"> <!-- enableSubPackages:是否让schema作为包的后缀 --> <property name="enableSubPackages" value="false" /> </javaClientGenerator> <!-- 指定数据库表 --> <table schema="" tableName="user"></table> <table schema="" tableName="orders"></table> <table schema="" tableName="items"></table> <table schema="" tableName="orderdetail"></table>
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值