CHAPTER 13
BINARY ANALYSIS
image
Indiana Jones might have exclaimed, “It belongs in a museum!” about an artifact a few thousand years old, but a computer archeologist deals in much shorter time scales. Technology changes so rapidly that it’s easy to find dead hardware or software that’s only a few years old. Software becomes obsolete for many reasons. Sometimes it’s replaced by newer, better versions. Sometimes the hardware it was designed for becomes obsolete, leaving the software with nowhere to execute. Sometimes it’s useful to review old binaries to discover exploits in the kind of legacy software that persists in large organizations, or to reverse ...

Get Anti-Hacker Tool Kit, Fourth Edition, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.