AdvancedReverse EngineeringMalwareWindows Internals

Practical Reverse Engineering

x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

4 / 5

A working reverser's textbook from three Microsoft / Quarkslab veterans, covering the architectures and toolchain you'll actually meet on real targets, including the Windows kernel and modern obfuscation patterns.

Buy on Amazon

As an Amazon Associate we earn from qualifying purchases. The link above is sponsored.

Published
2014
Publisher
Wiley
Pages
384
Language
English

Read this if

Reverse engineers transitioning from "I can read disassembly" to "I can audit a Windows kernel driver." The architecture-first companion to Practical Malware Analysis.

Skip this if

Beginners with no assembly background, or readers focused exclusively on Linux/userland. The book is heavy on Windows internals and assumes you'll do the exercises in WinDbg.

Key takeaways

  • x86, x64, ARM, kernel-mode debugging, and anti-RE techniques in a single coherent volume; nothing else competes for breadth.
  • The kernel debugging chapters are the practical introduction the official Windows Internals book never quite delivers for security audiences.
  • Anti-RE coverage (obfuscation, packing, anti-debug, virtualization-based protection) is the bridge to modern malware analysis that PMA consciously skips.

Notes

Best read alongside Practical Malware Analysis (PMA covers Windows malware techniques; PRE covers what's underneath). Pair with Windows Internals 7e for systems-level depth and with Practical Binary Analysis (Andriesse) for the modern dynamic-analysis layer. The exercises are the book; skipping them turns a great training course into expensive wallpaper.