Skip to content

Latest commit

 

History

History
69 lines (59 loc) · 2.04 KB

README.md

File metadata and controls

69 lines (59 loc) · 2.04 KB

Introduction

Hacking? What is it? And why learn it.

Hacking for me is a way of thinking. A way of solving problems using existing tools in some fluent and unorthodox way using existing rules.

My goal is to be fluent at various technologies. This repo contains all the code and notes from the book: Hacking- The Art of Exploitation by Jon Erickson.

I've organised my stuff this way so that I can keep track of stuff that I have done. Actual projects that may come up later will be uploaded in a different way in other repos.

I'll also be blogging about some of the things in my blog

I'll be adding lists for various things that need to be completed.

0x200 Programming

  1. What is Programming.
  2. Pseudo-Code
  3. Control Structures
  4. More Fundamental Programming Concepts
  5. Getting your Hands Dirty
  6. Back to Basics
  7. Memory Segmentation
  8. Building on Basics

0x300 Exploitation

  1. Generalized Exploit Techniques
  2. Buffer Overflows
  3. Experimenting with BASH
  4. Overflows in other Segments
  5. Format Strings

0x400 Networking

  1. OSI Model
  2. Sockets
  3. Peeling Back the Lower Layers
  4. Network Sniffing
  5. Denial of Service
  6. TCP/ IP Hijacking
  7. Port Scanning
  8. Reach out and Hack Someone

0x500 ShellCode

  1. Assembly Vs C
  2. The path to ShellCode
  3. Shell-Spawning ShellCode
  4. Port-Binding ShellCode
  5. Connect-Back ShellCode

0x600 CounterMeasures

  1. CounterMeasures that detect
  2. System Daemons
  3. Tools of the trade
  4. Log Files
  5. Overlooking the Obvious
  6. Advanced Camouflage
  7. The Whole Infrastructure
  8. Payload Smuggling
  9. Buffer Restrictions
  10. Hardening CounterMeasures
  11. Nonexecutable Stack
  12. Randomized Stack Space

0x700 Cryptology

  1. Information Theory
  2. Algorithmic Run Time
  3. Symmetric Encryption
  4. Asymmetric Encryption
  5. Hybrid Ciphers
  6. Password Cracking
  7. Wireless 8-2.11b Encryptionx
  8. WEP Attacks