
I'll give it a try and see if I get lost

cyberdrain wrote:Alright, good luck with it. There's too much knowledge to be gained and too little time. You have been warned
Escarii wrote:Hi all,
Been working my way through this book slowly over the last year and a bit. I'm new to most things IT so I've been using this book as a central point from which to orientate myself. I love this book overall - essentially everything you need to know to follow is in this book, however the content can be strangely organised - important concepts and commands buried in odd places in the text.
The examples are great though, easy to follow and all on the live CD. I bought this book a number of years ago before picking it up again recently and my copy of the CD is long lost. This presented some problems when it came to using some of the older tools or libraries but nothing I couldn't work around by following the book's advice and examining source code and manuals.
The course of the book runs roughly:
C coding, some bash and perl introductions, the 1st chapter introduces programs like a notetaker and a notesearch as well as the long final program, a game of chance. Chapter 2 covers the basics of stack and heap overflows and format string vulns, with emphasis on using gdb (gnu debugger) to follow the execution of programs and examines vulnerabilities in the programs built in chapter 1. Finally some common targets for overwrites and injecting premade shellcode. Chapter 4 is about networking, using sockets, sniffing packets, modifying live packets and network attacks like ARP spoofing and port-binding shellcode. Following on chapter 5 is an introduction to shellcode, chapter 6 focuses on building defensive countermeasures and builds an ftp deamon then follows the habbit by going on to break that deamon and covering your tracks. The last chapter is on cryptology but I havn't read it yet.
Overall a brilliant book, but I'd love to see a 3rd edition!
Users browsing this forum: No registered users and 0 guests