Skip to content

This repo keeps track of the exercises and concepts contained in the book:Hacking- The Art of exploitation by Jon Erickson.

License

Notifications You must be signed in to change notification settings

BonfaceKilz/ArtOfExploitation

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

Introduction

Hacking? What is it? And why learn it.

Hacking for me is a way of thinking. A way of solving problems using existing tools in some fluent and unorthodox way using existing rules.

My goal is to be fluent at various technologies. This repo contains all the code and notes from the book: Hacking- The Art of Exploitation by Jon Erickson.

I've organised my stuff this way so that I can keep track of stuff that I have done. Actual projects that may come up later will be uploaded in a different way in other repos.

I'll also be blogging about some of the things in my blog

I'll be adding lists for various things that need to be completed.

0x200 Programming

  1. What is Programming.
  2. Pseudo-Code
  3. Control Structures
  4. More Fundamental Programming Concepts
  5. Getting your Hands Dirty
  6. Back to Basics
  7. Memory Segmentation
  8. Building on Basics

0x300 Exploitation

  1. Generalized Exploit Techniques
  2. Buffer Overflows
  3. Experimenting with BASH
  4. Overflows in other Segments
  5. Format Strings

0x400 Networking

  1. OSI Model
  2. Sockets
  3. Peeling Back the Lower Layers
  4. Network Sniffing
  5. Denial of Service
  6. TCP/ IP Hijacking
  7. Port Scanning
  8. Reach out and Hack Someone

0x500 ShellCode

  1. Assembly Vs C
  2. The path to ShellCode
  3. Shell-Spawning ShellCode
  4. Port-Binding ShellCode
  5. Connect-Back ShellCode

0x600 CounterMeasures

  1. CounterMeasures that detect
  2. System Daemons
  3. Tools of the trade
  4. Log Files
  5. Overlooking the Obvious
  6. Advanced Camouflage
  7. The Whole Infrastructure
  8. Payload Smuggling
  9. Buffer Restrictions
  10. Hardening CounterMeasures
  11. Nonexecutable Stack
  12. Randomized Stack Space

0x700 Cryptology

  1. Information Theory
  2. Algorithmic Run Time
  3. Symmetric Encryption
  4. Asymmetric Encryption
  5. Hybrid Ciphers
  6. Password Cracking
  7. Wireless 8-2.11b Encryptionx
  8. WEP Attacks

About

This repo keeps track of the exercises and concepts contained in the book:Hacking- The Art of exploitation by Jon Erickson.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages