Become a fan of Slashdot on Facebook


Forgot your password?

The IDA Pro Book 85

An anonymous reader writes "After attending DEFCON in August and seeing the overwhelming interest in this book, I was eager to dive into The IDA Pro Book by Chris Eagle. Chris Eagle's team, School of Root, won the 'Capture the Flag' event at DEFCON this year and Chris gave a presentation on CollabREate, a tool that integrates with IDA Pro to allow collaboration in reverse engineering (RE). All of that — together with the fact that the book sold out — screamed that this book should quickly make it to the top of my list." This review originally appeared on The Ethical Hacker Network.
The IDA Pro Book
author Chris Eagle
pages 640
publisher No Starch Press
rating 9/10
reviewer Ryan Linn
ISBN 1593271786
summary An information-packed guide to IDA
Once I had the book in-hand, the cover alone offered some insight into what was to come. The quote on the front of the book is an endorsement from the creator of IDA Pro. The image on the front is a throwback to the Operation game by Milton Bradley, which reminds me of how I felt when I got started doing reverse engineering. I am not a professional Reverse Engineer or Malware Analyst; however, my coding background and my current position as a security professional at SAS affords the opportunity to dabble. This puts me in the perfect middle ground of being able to understand the material as well as assess its ability to teach.

The IDA Pro Book is broken up into a number of different "Parts" each having several chapters and its own goal. Even if the content appears to be beyond your level of knowledge in a certain area, I highly recommend that you keep reading. It may also be handy to point out the fact that the book is 640 pages. So this lends itself to being more of a reference guide than a book read straight through from cover to cover.

I should also mention at this point that the book is about the 5.X tree of IDA Pro, and not the freeware version. There is a demo that you can download off of the IDA Pro Website if you aren't able to purchase the full version right away. In addition, there is a reference at the back discussing how the freeware version differs from the commercial version, so as long as you are ok with those restrictions while you are learning, this book still should be very handy.

One of the most important sections of Chris' book is found in "Introduction to IDA." The author discusses disassembly and the challenges that go with it, the tools involved with reverse engineering and disassembly, and a general breakdown of how these tools approach the binaries that they are analyzing. He also references other tools that are handy alongside IDA Pro, and outlines how they fit into the reverse engineering process. Finally information about IDA Pro licensing and installation is discussed, and the base information that you will need for the rest of your IDA Pro adventure is laid out.

Once the basics of RE have been covered, the author addresses the fundamentals of using IDA Pro. Unlike some other books, this book does a great job of letting you know where you should be looking when it lays out a block of assembly code. The references are well laid out as well. "Part II: Basic IDA Usage" progresses logically and eases you into the interface. It does a great job helping you figure out what all the new windows are doing, and how to get to the information that IDA Pro is providing. The content moves from basic skills such as finding the disassembly into manipulating the disassembly to be more meaningful then to optimizing the disassembly process. It shows you how to navigate the code, and how to incorporate other knowledge that you have about the binary you are disassembling, such as what headers or what libraries might have been used in order to obtain the most useful disassembly possible and facilitate the disassembly of the binary.

"Part III: Advanced IDA Usage" gets deeper into using IDA Pro, including utilizing the Fast Library Identification and Recognition Technology (FLIRT) signatures and custom files in order to suck the most information possible out of a binary before analysis. You also get a glimpse into how to modify the pieces of the application which can be modified only through config files. It concludes by explaining the patch capabilities of IDA Pro and discussing what the limitations and expectations should be. This Part provides insight into creating your own signatures for custom libraries that might not be available in IDA Pro, so, as you start working on real life applications, you can tailor IDA Pro to be able to recognize libraries that you frequently encounter.

After the basics of using the application have been covered, the author explains how to extend the capabilities of IDA Pro in Parts III and IV. He discusses in depth the scripting engine and how to build plug-ins and modules. Throughout this Part numerous examples are given of how the scripting and plug-ins fit into the application. Short detailed examples are used to illustrate how to accomplish some tasks that would be useful for a reverse engineer including listing out function information. The beginning of the chapter was great. As a beginning Reverse Engineer, I was able to clearly see how this information would apply. For the stuff that was beyond my current knowledge level, it was easy to see that as my knowledge progresses in the future, I would be back to re-visit this information.

Throughout the entire fifth Part are goodies focusing on the real-world applications of IDA Pro. It goes into the different types of binaries that you might encounter while doing reverse engineering. This chapter also goes into two large areas where IDA Pro is used such as obfuscated code analysis and vulnerability analysis. After reading this Part, you should have some handy scripts and a series of applications and plug-ins to aid in your RE adventures. The author discusses a number of those plug-ins in-depth including adding in bindings for Python and Ruby. At the end of this chapter, I hadn't learned an incredible amount more about IDA Pro; however I definitely knew more about how to approach the problems I might encounter and how to extend IDA Pro's capabilities in order to tackle real world tasks.

The final Part of the book is on the IDA Debugger. The debugging features of IDA Pro were an afterthought and aren't the primary focus of IDA Pro. Chris Eagle goes into what to expect from the debugger, how it's used, and then finally how to integrate the information obtained from the debugger into the overall RE process. He concludes with a discussion of how to automate debugging tasks with scripts and plug-ins and discusses some of the real-world problems that people might encounter, such as dealing with UPX packing that has been modified. This chapter also goes into remote debugging, where you can be running a binary on one machine and having it come back to a GUI on another. Knowing this information is especially useful if you are doing analysis across multiple platforms. The Windows GUI is the only non-console GUI in the IDA Pro supported platforms.

Chris Eagle's The IDA Pro Book provides a significantly better understanding not of just IDA Pro itself, but of the entire RE process. There are little gems littered throughout the book that bring in real-life experience and knowledge that you don't always get from other books instructing you in the use of an application. Although it is impossible to absorb everything in this book due to its size, it helped greatly in overcoming some of the initial hurdles of understanding a highly technical topic. As I continue down my reverse engineering path, I'm confident that I will use this book repeatedly as a reference.

If you are interested in getting deep into the assembly and figuring out what applications are doing when you don't have the source, then I would highly recommend this book to get you started with IDA Pro; it won't turn you into a reverse engineering expert, but it certainly will provide you with a major tool that will help you along the way.

You can purchase The IDA Pro Book from Slashdot welcomes readers' book reviews -- to see your own review here, read the book review guidelines, then visit the submission page.


This discussion has been archived. No new comments can be posted.

The IDA Pro Book

Comments Filter:
  • Good book (Score:1, Informative)

    by Anonymous Coward on Wednesday October 29, 2008 @12:50PM (#25557297)
    But my binding did break after a week.
  • Re:Good book (Score:3, Informative)

    by EasyComputer ( 797633 ) on Wednesday October 29, 2008 @12:57PM (#25557405)
    This is not the first book about IDA Pro. However, this is the first book I recommend to anyone using IDA Pro because of the following points: * Comprehensive: it describes all major IDA features by starting at the beginning and going all the way to the end. Experienced users may be tempted to skip the first few chapters; resist this temptation and you will discover something new (I did :) * Accurate: it is very difficult to be detailed and precise when describing such a complex product. Chris does it excellently well. * Real: handles real world malware, packers, and obfuscated code * No fillers: it is direct and concise * Profound: this is not just a collection of recipes or tricks, but will give you a better understanding of the IDA architecture, thus saving you from unnecessary frustration. Knowing the limitations of your tool is just as important as knowing its capabilities. It comes tons of code snippets, scripts, and sample modules. Programming for IDA Pro is covered too: from simple plugins to processor modules. [] ----This is not my blog.
  • by MarkusQ ( 450076 ) on Wednesday October 29, 2008 @01:04PM (#25557505) Journal

    Since the review doesn't really make it clear, IDA is a dissassembler []. It allows you to take an executable for which you don't have source and construct a (generally partial) representation of what a program that would have produced that executable would look like. It can't of course give you back the actual source code (comments, variable names, etc. being lost forever) but it gives you a much, much better idea of what's going on than a hex dump would.


  • Original posting (Score:4, Informative)

    by whitehatnetizen ( 997645 ) on Wednesday October 29, 2008 @01:07PM (#25557555)
    Originally posted here: []
  • by whitehatnetizen ( 997645 ) on Wednesday October 29, 2008 @01:12PM (#25557637)
    Note that there is a distinction between dissassembler and decompiler - you seem to be describing it as a decompiler, which it is not. it is similar in function to OllyDbg, although quite superior in it's analysis of the file due to its in-built libraries etc. The graphical representation of the program flow is my favorite part - it saves a huge amount of time when reversing (for me anyway).
  • Excellent book (Score:4, Informative)

    by Peter Bortas ( 130 ) on Wednesday October 29, 2008 @01:21PM (#25557797)

    This is the only good book on IDA there is. There are several other books on RE that bring up IDA, but never dives in to any interesting details. That includes the book "Reverse Engineering Code with IDA Pro" which does a passable job of introducing you to RE, but doesn't tell you much about IDA that you couldn't get from spending an evening with it just experimenting.

    So, to anyone interested in IDA: This is the book you should buy. Now. With express delivery.

  • by AndrewHowe ( 60826 ) on Wednesday October 29, 2008 @01:41PM (#25558087)

    I read and re-read MarkusQ's comment and he isn't describing IDA Pro as a decompiler at all, in fact he's explicity saying "It can't of course give you back the actual source code".
    The decompiler is called Hex-Rays, it's built on top of IDA Pro and is available from the same guys at (Not advertising, just a long time happy IDA Pro customer).

  • by morgan_greywolf ( 835522 ) on Wednesday October 29, 2008 @01:45PM (#25558141) Homepage Journal

    Well, that's okay, because I don't actually have a sense of humor.

  • by camcorder ( 759720 ) on Wednesday October 29, 2008 @01:46PM (#25558147)
    Better note that with Hex-Ray plugin [] decompiler functionality can be added to IDA Pro.
  • by kmahan ( 80459 ) on Wednesday October 29, 2008 @03:12PM (#25559493)

    I used to use IDAPro a lot -- but then they went to the new pricing model which increased the cost dramatically. So while it is a great product it really isn't affordable for people that don't have a corporate expense account.

  • by Anonymous Coward on Wednesday October 29, 2008 @04:16PM (#25560329)

    The version of tvision to which you point is not the version that IDA utilizes. Tvision was developed and released by Borland. It has been ported and modified by a number of different people over the years. IDA uses it as a shared library component. Hex-rays releases the tvision source code to anyone who purchases IDA, i.e. to anyone who they distribute tvision to, which is their obligation under the GPL. I believe they also distribute the source to wingraph32.

  • by tlhIngan ( 30335 ) <slashdot&worf,net> on Wednesday October 29, 2008 @05:53PM (#25561695)

    I used to use IDAPro a lot -- but then they went to the new pricing model which increased the cost dramatically. So while it is a great product it really isn't affordable for people that don't have a corporate expense account.

    That, and when I was checking it out, they only sold to established companies - you couldn't buy it even if you wanted to... which is probably why it cost so much. I'd go with the free version, but that had a number of limitations.

    It appears the only way to actually get full IDA Pro is to ... torrent it.

  • Re:Good book (Score:2, Informative)

    by Anonymous Coward on Thursday October 30, 2008 @10:08AM (#25568709)

    If IDA Pro allowed you to edit the code

    It does:

    1. In cfg/idagui.cfg, set DISPLAY_PATCH_SUBMENU = YES
    2. Use the newly found Edit->Patch program submenu to patch bytes or assemble new instructions. (IDC scripts can do the former as well, but not the latter, unfortunately.)
    3. Once you're happy with the result, use File->Produce File->Create EXE File to save the changed executable to disk.

Disks travel in packs.