Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- HOW TO UNSKID YOURSELF 101
- [1.] Hacking: The Art of Exploitation, 2nd Edition
- This book covers coding (c, x86 assembly), exploitation (stack overflow, heap overflow, Format String), Networking (and network-based attacks), writing shellcode, countermeasures and some cryptology.
- It's the very first book to read since it doesn't expect you to know anything before you start.
- [2.] Web application Hacker's Handbook, 2nd Edition
- Covers pretty all areas of web application security, could be seen as a reference guide (look up the stuff you need), or a book to be read from start to finish.
- I'd recommend reading at least the first chapters before jumping back and forth in the book.
- [3.] Introductory Intel x86: Architecture, Assembly, Applications, & Alliteration
- http://opensecuritytraining.info/IntroX86.html
- https://www.youtube.com/watch?v=H4Z0S9ZbC0g
- A video course teaching you Intel x86, something you'll really want to know if you plan on pwning gibsons.
- It's a long course, but absolutely amazing which gives you a real good foundation for learning Software Exploitation and Reverse Engineering.
- Some of the stuff covered here are also in Hacking: TAoE, but practice makes perfect.
- [4.] Offensive Computer Security
- http://www.cs.fsu.edu/~redwood/OffensiveComputerSecurity/lectures.html
- Another course, this time from FSU.
- Goes over:
- Secure Coding in C / Code Auditing
- Reverse Engineering
- Fuzzing
- Exploit Development
- * Stack/Heap/Format String
- * ret2libc
- * ASLR, NX/DEP, Stack Cookies, EMET
- * Return Oriented Programming (ROP)
- Networking
- Web application Hacking/Security
- * WAF
- * IDS
- * SSL
- Metasploit
- Post Exploitation
- Forenscics and Incident Response
- Physical Security and Social Engineering
- [5.] The Shellcoder's Handbook: Discovering and Exploiting Security Holes
- Covers pretty much everything you want to know about exploiting software.
- It came out in 2007, so you still need to read up on the latest techniques such as ROP.
- [6.] A Guide to Kernel Exploitation: Attacking the Core
- You wanna write kernel exploits? Of course you do.
- Look no further.
- Note: This book requires a deep understanding of Computer Architecture and Operating systems.
- Some other great books to read in no particular order...
- Reversing: Secrets of Reverse Engineering
- Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
- Black Hat Python: Python Programming for Hackers and Pentesters
- Metasploit: The Penetration Tester's Guide
- The Browser Hacker's Handbook
- The Rootkit Arsenal: Escape and Evasion: Escape and Evasion in the Dark Corners of the System
- Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
- Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
- The Hacker Playbook: Practical Guide To Penetration Testing
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement