📖 Overview
Reversing: Secrets of Reverse Engineering is a comprehensive textbook that details the fundamentals and advanced techniques of software reverse engineering. The book focuses on the Microsoft Windows environment and provides hands-on examples using real-world tools like OllyDbg.
The text covers core topics including software protection analysis, malware investigation, and code obfuscation techniques. Legal considerations of reverse engineering are addressed through examination of significant court cases and rulings, providing context for practical applications.
The structure progresses from basic concepts through advanced applications, with sections on reversing fundamentals, applied techniques, protection mechanisms, and decompilation. The material can serve both as a self-study guide and as a university course text.
This technical guide represents an intersection of security research, software analysis, and practical engineering methodology. It maintains relevance for both security professionals and software developers who need to understand how their code may be analyzed or protected.
👀 Reviews
Readers describe this as a detailed technical manual that teaches both basic and advanced reverse engineering concepts. Many cite it as their introduction to the field.
Likes:
- Clear explanations of complex assembly code
- Real-world examples and code samples
- Comprehensive coverage of Windows internals
- Strong focus on practical techniques
- Detailed walkthrough of decompilation methods
Dislikes:
- Some examples and tools are outdated (Windows XP/2000 era)
- Advanced sections can overwhelm beginners
- Price point considered high by students
- Technical density makes it hard to read cover-to-cover
Ratings:
Goodreads: 4.1/5 (245 ratings)
Amazon: 4.3/5 (116 ratings)
Reader quote: "The first few chapters are worth the price alone. Changed how I approach understanding unfamiliar code." - Amazon reviewer
Several readers note it works better as a reference manual than a tutorial, recommending selective reading of relevant chapters rather than linear progression.
📚 Similar books
Practical Malware Analysis by Michael Sikorski
A guide to the tools and techniques for analyzing malicious code and understanding how malware operates at a deep technical level.
The IDA Pro Book by Chris Eagle This reference covers the operation and capabilities of IDA Pro, the primary tool for reverse engineering software and analyzing compiled binaries.
Gray Hat Python by Justin Seitz A technical exploration of using Python programming for reverse engineering, debugging, and software analysis tasks.
Hacking: The Art of Exploitation by Jon Erickson The book examines programming, debugging, and reverse engineering from a low-level perspective with focus on memory corruption and system internals.
The Ghidra Book by Chris Eagle and Kara Nance A comprehensive guide to the NSA's open-source reverse engineering framework with examples of analyzing and understanding compiled code.
The IDA Pro Book by Chris Eagle This reference covers the operation and capabilities of IDA Pro, the primary tool for reverse engineering software and analyzing compiled binaries.
Gray Hat Python by Justin Seitz A technical exploration of using Python programming for reverse engineering, debugging, and software analysis tasks.
Hacking: The Art of Exploitation by Jon Erickson The book examines programming, debugging, and reverse engineering from a low-level perspective with focus on memory corruption and system internals.
The Ghidra Book by Chris Eagle and Kara Nance A comprehensive guide to the NSA's open-source reverse engineering framework with examples of analyzing and understanding compiled code.
🤔 Interesting facts
🔍 The author, Eldad Eilam, later founded Hopster, a pioneering mobile coupon company that was acquired by Inmar in 2012.
🖥️ The book was one of the first comprehensive works to address Windows-specific reverse engineering when it was published in 2005, during a time when most resources focused on Linux.
⚖️ It remains one of few technical books to extensively address the legal aspects of reverse engineering, including the DMCA implications and fair use provisions.
🎓 The text has been adopted as required reading in computer science courses at several major universities, including courses on software security and malware analysis.
🔧 Many tools discussed in the book, like OllyDbg, are still actively used today, demonstrating the enduring relevance of the core reverse engineering principles presented.