Advertisement
Guest User

HOW TO UNSKID YOURSELF 101

a guest
Feb 24th, 2015
889
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.82 KB | None | 0 0
  1. HOW TO UNSKID YOURSELF 101
  2.  
  3. [1.] Hacking: The Art of Exploitation, 2nd Edition
  4.  
  5. This book covers coding (c, x86 assembly), exploitation (stack overflow, heap overflow, Format String), Networking (and network-based attacks), writing shellcode, countermeasures and some cryptology.
  6. It's the very first book to read since it doesn't expect you to know anything before you start.
  7.  
  8. [2.] Web application Hacker's Handbook, 2nd Edition
  9.  
  10. Covers pretty all areas of web application security, could be seen as a reference guide (look up the stuff you need), or a book to be read from start to finish.
  11. I'd recommend reading at least the first chapters before jumping back and forth in the book.
  12.  
  13. [3.] Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration
  14.  
  15. http://opensecuritytraining.info/IntroX86.html
  16. https://www.youtube.com/watch?v=H4Z0S9ZbC0g
  17.  
  18. A video course teaching you Intel x86, something you'll really want to know if you plan on pwning gibsons.
  19. It's a long course, but absolutely amazing which gives you a real good foundation for learning Software Exploitation and Reverse Engineering.
  20. Some of the stuff covered here are also in Hacking: TAoE, but practice makes perfect.
  21.  
  22. [4.] Offensive Computer Security
  23.  
  24. http://www.cs.fsu.edu/~redwood/OffensiveComputerSecurity/lectures.html
  25.  
  26. Another course, this time from FSU.
  27. Goes over:
  28. Secure Coding in C / Code Auditing
  29. Reverse Engineering
  30. Fuzzing
  31. Exploit Development
  32. * Stack/Heap/Format String
  33. * ret2libc
  34. * ASLR, NX/DEP, Stack Cookies, EMET
  35. * Return Oriented Programming (ROP)
  36. Networking
  37. Web application Hacking/Security
  38. * WAF
  39. * IDS
  40. * SSL
  41. Metasploit
  42. Post Exploitation
  43. Forenscics and Incident Response
  44. Physical Security and Social Engineering
  45.  
  46.  
  47. [5.] The Shellcoder's Handbook: Discovering and Exploiting Security Holes
  48.  
  49. Covers pretty much everything you want to know about exploiting software.
  50. It came out in 2007, so you still need to read up on the latest techniques such as ROP.
  51.  
  52. [6.] A Guide to Kernel Exploitation: Attacking the Core
  53.  
  54. You wanna write kernel exploits? Of course you do.
  55. Look no further.
  56.  
  57. Note: This book requires a deep understanding of Computer Architecture and Operating systems.
  58.  
  59.  
  60. Some other great books to read in no particular order...
  61.  
  62. Reversing: Secrets of Reverse Engineering
  63. Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
  64. Black Hat Python: Python Programming for Hackers and Pentesters
  65. Metasploit: The Penetration Tester's Guide
  66. The Browser Hacker's Handbook
  67. The Rootkit Arsenal: Escape and Evasion: Escape and Evasion in the Dark Corners of the System
  68. Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
  69. Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
  70. The Hacker Playbook: Practical Guide To Penetration Testing
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement