Table of Contents
- Preparing to Reverse
- Identification and extraction of hidden components
- The Low-Level Language
- Static and Dynamic Reversing
- Tools of the trade
- RE in Linux platforms
- RE in Windows platforms
- Sandboxing: Virtualization as a component for RE
- Binary Obfuscation Techniques
- Packing and Encryption
- Anti-analysis Tricks
- Practical Reverse Engineering of a Windows Executable
- Reversing various File-types

