

For the sake of simplicity, we will use Ubuntu 16.04 LTS extensively throughout this book, partly due to the fact it is still supported, but also because it is the last LTS build of Ubuntu that makes both a 32-bit and 64-bit version available for both the Desktop and Server versions. I could have easily skipped this chapter entirely however, I believe it's important for you, the reader, to understand how and where to acquire the tools that will be used throughout the examples that are presented within each chapter. Since the focus of this book is on Linux and its available tools, we will make sure to only use tools that are open source or that are available natively. This means we'll need to set up the operating systems and associated tools we will use throughout this book. So, before we just dive into dissecting and analyzing ELF binaries on Linux, we need to make sure we have the appropriate environment set up to do so. Like most subjects within the world of information security, it helps to have the correct tools at the ready in order to streamline the process for any undertaking. Learning how to analyze ELF binaries is by no means a simple topic to digest. You'll even examine obfuscation and anti-analysis techniques, analyze polymorphed malicious binaries, and get a high-level overview of dynamic taint analysis and binary instrumentation concepts.īy the end of the book, you'll have gained comprehensive insights into binary analysis concepts and have developed the foundational skills to confidently delve into the realm of binary analysis. As you advance, you'll learn how to analyze malicious 32-bit and 64-bit binaries and identify vulnerabilities. The book will then guide you in developing a methodology and exploring a variety of tools for Linux binary analysis.

You'll begin by learning about the IA32 and ELF32 as well as IA64 and ELF64 specifications. Using a recipe-based approach, this book guides you through building a lab of virtual machines and installing tools to analyze binaries effectively. This binary analysis book is designed to help you get started with the basics, before gradually advancing to challenging topics. It is a complex, constantly evolving, and challenging topic that crosses over into several domains of information technology and security.

Binary analysis is the process of examining a binary program to determine information security actions.
