[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

Creating a guide to becomming a computer haxzor

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 6
Thread images: 1

File: 1503062241730.gif (929KB, 500x388px) Image search: [Google]
1503062241730.gif
929KB, 500x388px
He /g/, I'm trying to create a reading list for people interested in learning more about computer hacking and reverse engineering.

My current books that on the list are

'Code' by Charles Petzold
'The C Programming Language' by Dennis Ritchie and Brian Kerigan
'Hacking : TAE' by Jon Erickson
'Hacking the Xbox' by Andrew Huang

I'm trying to include not only general knowledge books like TCPL but also books that focus on the background of exploits as much as the methods of finding them like 'Hacking Xbox'.

I also understand that really ANY general CS book can be considered a 'Hacking' book so I'm trying to keep this down to lower level languages (C, x86 asm) and general cs hardware knowledge rather than focusing on specific popular languages i.e. : Python, Java, etc. (I may have a special area at the bottom for these but not part of the main figure)

Can any of you """"""""well read"""""""" fellas give me any suggestions / criticisms?
>>
I only hacked a system with a buffer overflow vulnerability more than a decade ago. I imagine exploiting even buffer overflow now it is more difficult. All what I needed was: (a) learning some C standard; (b) x86 assembly and how to write shellcodes for Linux; (c) a bit of Linux; (d) a few tutorials from online Phrack magazine. The last one is invaluable resource. It looks like it is still being released..
>>
Hacking: the art of exploitation

The only one you'll need
>>
>>61999099
Assembly language is a must.
Look at some of the documents that was leaked on Wikileaks about the cia tools
>>
>>61999675
Most of that book can be condensed down to http://insecure.org/stf/smashstack.html
>>
>>61999099
'The Unix Programming Environment" By Brian Kerningham and Rob Pike is a classic must-read
Thread posts: 6
Thread images: 1


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.