Covert Java
Techniques for Decompiling, Patching, and Reverse Engineering
Résumé
Have you ever been in a crunch where all conventional approaches have failed? Do you know of a product that solves exactly the same problem you are facing but there is no documentation on how to implement it? Are you using a third-party library for which you need to change some of the logic but you don't have the source code?
This book shows how to overcome unsurpassable problems with practical methods such as:
- Decompiling and obfuscating classes
- Hacking non-public variables and methods
- Replacing and patching application classes
- Using Profilers for application runtime analysis
- Eavesdropping to facilitate troubleshooting and performance tuning
- Intercepting control flow and controlling class loading
- Understanding and tweaking bytecode
- Altering third party application logic
- Hacking JVM behavior
- Protecting commercial applications from hackers
Author Alex Kalinovsky acknowledges that the techniques in Covert Java are controversial, but as he says in the Introduction "...Any information or discovery can be used for good or ill. This book is for the good guys, and if you are a bad guy please stop reading right now and get a new job with the testing team."
Tricks and in-depth information presented in 'Covert Java can save you hours of effort. Each chapter focuses on a technique that solves a specific problem -- outlining the problem, demonstrating the solution, and then suggesting additional ideas for testing the approach.
L'auteur - Alex Kalinovsky
Alex Kalinovsky has been in the IT industry for more than nine years, with experience that ranges from developing with C and C++ on Windows, to Java on Unix. He is a lead developer for WebCream, a revolutionary Java product that uses many of the techniques that will be covered in the book. Since 1997, Alex has worked solely with Java and is proud to be one of its original evangelists and gurus. He has worked as an architect and tech lead on various enterprise-level projects involving EJB, CORBA, Servlets/JSP, XML, Swing, and others. He has taught more than 15 different classes on enterprise Java technologies and worked as a mentor for many teams.
Sommaire
- Getting Started
- Decompiling Classes
- Obfuscating Classes
- Hacking Non-Public Methods and Variables of a Class
- Replacing and Patching Application Classes
- Using Effective Tracing
- Manipulating Java Security
- Snooping the Runtime Environment
- Cracking Code with Unorthodox Debuggers
- Using Profilers for Application Runtime Analysis
- Load-Testing to Find and Fix Scalability Problems
- Reverse Engineering Applications
- Eavesdropping Techniques
- Controlling Class Loading
- Replacing and Patching Core Java Classes
- Intercepting Control Flow
- Understanding and Tweaking Bytecode
- Total Control with Native Code Patching
- Protecting Commercial Applications from Hacking
- Appendix A Commercial Software License
- Appendix B Resources
- Appendix C Quiz Answers
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Sams |
Auteur(s) | Alex Kalinovsky |
Parution | 15/06/2004 |
Nb. de pages | 270 |
Format | 18,5 x 23 |
Couverture | Broché |
Poids | 490g |
Intérieur | Noir et Blanc |
EAN13 | 9780672326387 |
ISBN13 | 978-0-672-32638-7 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse