Hacking? What is it? And why learn it.
Hacking for me is a way of thinking. A way of solving problems using existing tools in some fluent and unorthodox way using existing rules.
My goal is to be fluent at various technologies. This repo contains all the code and notes from the book: Hacking- The Art of Exploitation by Jon Erickson.
I've organised my stuff this way so that I can keep track of stuff that I have done. Actual projects that may come up later will be uploaded in a different way in other repos.
I'll also be blogging about some of the things in my blog
I'll be adding lists for various things that need to be completed.
- What is Programming.
- Pseudo-Code
- Control Structures
- More Fundamental Programming Concepts
- Getting your Hands Dirty
- Back to Basics
- Memory Segmentation
- Building on Basics
- Generalized Exploit Techniques
- Buffer Overflows
- Experimenting with BASH
- Overflows in other Segments
- Format Strings
- OSI Model
- Sockets
- Peeling Back the Lower Layers
- Network Sniffing
- Denial of Service
- TCP/ IP Hijacking
- Port Scanning
- Reach out and Hack Someone
- Assembly Vs C
- The path to ShellCode
- Shell-Spawning ShellCode
- Port-Binding ShellCode
- Connect-Back ShellCode
- CounterMeasures that detect
- System Daemons
- Tools of the trade
- Log Files
- Overlooking the Obvious
- Advanced Camouflage
- The Whole Infrastructure
- Payload Smuggling
- Buffer Restrictions
- Hardening CounterMeasures
- Nonexecutable Stack
- Randomized Stack Space
- Information Theory
- Algorithmic Run Time
- Symmetric Encryption
- Asymmetric Encryption
- Hybrid Ciphers
- Password Cracking
- Wireless 8-2.11b Encryptionx
- WEP Attacks