没有合适的资源?快使用搜索试试~ 我知道了~
首页Sams.Covert.Java.Techniques.for.Decompiling.Patching.and.Reverse.Engineering
Sams.Covert.Java.Techniques.for.Decompiling.Patching.and.Reverse...
需积分: 16 9 下载量 171 浏览量
更新于2023-07-06
评论
收藏 3.85MB PDF 举报
Sams.Covert.Java.Techniques.for.Decompiling.Patching.and.Reverse.Engineering
资源详情
资源评论
资源推荐
800 East 96th Street, Indianapolis, Indiana 46240
00 0672326388 FM 4/9/04 2:37 PM Page i
Covert Java: Techniques for Decompiling, Patching,
and Reverse Engineering
Copyright 2004 by Sams Publishing
All rights reserved. No part of this book shall be reproduced, stored in a
retrieval system, or transmitted by any means, electronic, mechanical,
photocopying, recording, or otherwise, without written permission from
the publisher. No patent liability is assumed with respect to the use of the
information contained herein. Although every precaution has been taken
in the preparation of this book, the publisher and author assume no
responsibility for errors or omissions. Nor is any liability assumed for
damages resulting from the use of the information contained herein.
International Standard Book Number: 0-672-32638-8
Library of Congress Catalog Card Number: 2003116632
Printed in the United States of America
First Printing: May 2004
07 06 03 04 4321
Bulk Sales
Sams Publishing offers excellent discounts on this book when ordered in
quantity for bulk purchases or special sales. For more information, please
contact
U.S. Corporate and Government Sales
1-800-382-3419
corpsales@pearsontechgroup.com
For sales outside of the United States, please contact
International Sales
1-317-428-3341
international@pearsontechgroup.com
Trademarks
All terms mentioned in this book that are known to be trademarks or
service marks have been appropriately capitalized. Sams Publishing cannot
attest to the accuracy of this information. Use of a term in this book
should not be regarded as affecting the validity of any trademark or service
mark.
Warning and Disclaimer
Every effort has been made to make this book as complete and as accurate
as possible, but no warranty or fitness is implied. The information
provided is on an “as is” basis. The author and the publisher shall have
neither liability nor responsibility to any person or entity with respect to
any loss or damages arising from the information contained in this book.
Associate Publisher
Michael Stephens
Acquisitions Editor
Todd Green
Development Editor
Sean Dixon
Managing Editor
Charlotte Clapp
Project Editor
Elizabeth Finney
Production Editor
Megan Wade
Indexer
Mandie Frank
Proofreader
Katie Robinson
Technical Editor
Craig Pfeifer
Publishing
Coordinator
Cindy Teeters
Multimedia Developer
Dan Scherf
Interior Designer
Gary Adair
Cover Designer
Gary Adair
Page Layout
Brad Chinn
00 0672326388 FM 4/9/04 2:37 PM Page ii
Contents at a Glance
Introduction .................................................................................................1
1 Getting Started..............................................................................................5
2 Decompiling Classes...................................................................................13
3 Obfuscating Classes ....................................................................................27
4 Hacking Non-Public Methods and Variables of a Class.............................43
5 Replacing and Patching Application Classes .............................................51
6 Using Effective Tracing ...............................................................................63
7 Manipulating Java Security ........................................................................69
8 Snooping the Runtime Environment.........................................................75
9 Cracking Code with Unorthodox Debuggers ............................................81
10 Using Profilers for Application Runtime Analysis .....................................89
11 Load-Testing to Find and Fix Scalability Problems..................................105
12 Reverse Engineering Applications ............................................................121
13 Eavesdropping Techniques .......................................................................127
14 Controlling Class Loading........................................................................139
15 Replacing and Patching Core Java Classes...............................................149
16 Intercepting Control Flow........................................................................155
17 Understanding and Tweaking Bytecode ..................................................165
18 Total Control with Native Code Patching ...............................................185
19 Protecting Commercial Applications from Hacking................................201
A Commercial Software License ..................................................................227
B Resources...................................................................................................233
C Quiz Answers ............................................................................................239
Index .........................................................................................................249
00 0672326388 FM 4/9/04 2:37 PM Page iii
Table of Contents
Introduction 1
1 Getting Started 5
Techniques Overview—When and Why to Use Each Method ..................5
Improving Productivity with File Managers ...............................................7
FAR and Total Commander ................................................................8
Java IDEs ...........................................................................................10
Sample Application Functionality and Structure .....................................11
Quick Quiz .................................................................................................12
In Brief .......................................................................................................12
2 Decompiling Classes 13
Determining When to Decompile ............................................................13
Knowing the Best Decompilers .................................................................14
Decompiling a Class ..................................................................................16
What Makes Decompiling Possible? .........................................................22
Potential Problems with Decompiled Code ..............................................23
Quick Quiz .................................................................................................25
In Brief .......................................................................................................25
3 Obfuscating Classes 27
Protecting the Ideas Behind Your Code ....................................................27
Obfuscation As a Protection of Intellectual Property ...............................28
Transformations Performed by Obfuscators .............................................29
Stripping Out Debug Information ...................................................29
Name Mangling ................................................................................29
Encoding Java Strings .......................................................................30
Changing Control Flow ...................................................................31
Inserting Corrupt Code ....................................................................32
Eliminating Unused Code (Shrinking) ............................................33
Optimizing Bytecode ........................................................................33
Knowing the Best Obfuscators ..................................................................33
Potential Problems and Common Solutions ............................................34
Dynamic Class Loading ...................................................................34
Reflection ..........................................................................................35
00 0672326388 FM 4/9/04 2:37 PM Page iv
剩余282页未读,继续阅读
DoomLord
- 粉丝: 114
- 资源: 1319
上传资源 快速赚钱
- 我的内容管理 收起
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
会员权益专享
最新资源
- zigbee-cluster-library-specification
- JSBSim Reference Manual
- c++校园超市商品信息管理系统课程设计说明书(含源代码) (2).pdf
- 建筑供配电系统相关课件.pptx
- 企业管理规章制度及管理模式.doc
- vb打开摄像头.doc
- 云计算-可信计算中认证协议改进方案.pdf
- [详细完整版]单片机编程4.ppt
- c语言常用算法.pdf
- c++经典程序代码大全.pdf
- 单片机数字时钟资料.doc
- 11项目管理前沿1.0.pptx
- 基于ssm的“魅力”繁峙宣传网站的设计与实现论文.doc
- 智慧交通综合解决方案.pptx
- 建筑防潮设计-PowerPointPresentati.pptx
- SPC统计过程控制程序.pptx
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论0