Hacking and Programming

What are some Sup Forums approved programming books for someone wanting to get into hacking/pentesting?

Other urls found in this thread:

cs.cmu.edu/~rjsimmon/15122-s16/schedule.html
scs.hosted.panopto.com/Panopto/Pages/Sessions/List.aspx#folderSets=15&folderID="632b424b-8526-4314-b82f-0428c1c68e39"&page=1
cs.cmu.edu/~fp/courses/15411-f14/schedule.html
youtu.be/HqlMSnY0b2w
en.wikipedia.org/wiki/Satisfiability_modulo_theories
hopperapp.com/
intel.com/content/dam/www/public/us/en/documents/manuals/64-ia-32-architectures-software-developer-manual-325462.pdf
hopperapp.com/download.html
cs.colorado.edu/~srirams/papers/popl10.pdf
twitter.com/NSFWRedditImage

freecst.com books, and if you really want good books I heard that SANS books are the good shit check ebay for them and enjoy paying $500 for books that will possibly be over your head.

bump

>paying for things
found the jew

bump

bump

bumping for intrest

What you need is:

(a) native-level proficiency with C and the memory hierarchy that C tries to abstract (ie: you want to understand what goes in registers, when, and why, and how a stack frame is laid out and why)

(b) at least limited working proficiency with compiler theory, most especially the analysis of control flow graphs

Understanding compiler IRs (particularly LLVM) is getting more important. Both exploit dev and reversing is becoming more and more theoretical (predicate translations and satisfiability, symbolic execution, &c) and less and less systems/network as that is getting larger-scale: like, writing whole-system emulators to reverse firmware targets.

This is the current state

thnx for bumps

This thread gets posted like every week.

I wish a 'Cyber Security General" would get made or something.

>another shitty general where 1 or 2 people post actual information in between the garbage shit posting until the thread dies after 30 posts

fuck off. i am security engineer and ive posted resources a couple times. not today though buddy

That would be awesome.

I already have a basic understanding of systems and networking(TCP/IP, DNS, OSI Model, etc)

Also, here's how you learn it:

15-122
cs.cmu.edu/~rjsimmon/15122-s16/schedule.html

Lectures
scs.hosted.panopto.com/Panopto/Pages/Sessions/List.aspx#folderSets=15&folderID="632b424b-8526-4314-b82f-0428c1c68e39"&page=1

This will teach you how imperative languages work (C) and how to proof/reason code correctness (in C0, then they transfer to C).

Then take some Compiler theory
cs.cmu.edu/~fp/courses/15411-f14/schedule.html

Also implement the little compiler in SICP at the end of the book. Now find the Handbook of Satisfiability (SAT) and every other resource you can on modern analysis/SAT

youtu.be/HqlMSnY0b2w
en.wikipedia.org/wiki/Satisfiability_modulo_theories

Finally read The Art of Software Security Assessment which will teach you how to exploit those bugs that are revealed to write a PoC so you can sell your bugs to the NSA lul

is reversing viable on linux? i feel like i cant reverse as many exes or dlls as i can on windows.

unless i use a vm.

I did with hopper
hopperapp.com/

License is only $120 compared to $1k for IDA pro

I've just been running Ida in Wine. Works surprisingly good. But I feel like I'm getting nipped out of reversing opportunities Can you reverse normal Windows EXEs with Hopper?

You can start by reading this.

intel.com/content/dam/www/public/us/en/documents/manuals/64-ia-32-architectures-software-developer-manual-325462.pdf

Yes, try the demo hopperapp.com/download.html

I just grab the CFG and run analysis on it. cs.colorado.edu/~srirams/papers/popl10.pdf

You can reverse iOS apps with it too, android apps, hopper is awesome.

Reverse the google play framework and write your own crude alternative if you want to go full Stallman as that's the kind of shit he used to do at MIT labs. Run a phone free of google AIDS yet you can still use Signal/Textsecure

so exploit dev is becoming math analysis? good to know.

I don't get it. You're a Jew if you pay for things and Jew if you don't.

Somebody teach me the Kabbalah.

He's just poor and finds no value in buying physical books.

Yes, it's actually much easier now. You use an Inductive Map to map each node to a set of program states then bash the shit out of the CFG logic with edge cases.

Most of the tools are already developed for automating this, but expensive. To do it yourself just learn some basic proof by induction which is standard in any first year calc course, and discrete Satisfiability.

Interesting, could you provide some more info/papers to read?

k, nvm did not see

>Understanding compiler IRs (particularly LLVM) is getting more important. Both exploit dev and reversing is becoming more and more theoretical (predicate translations and satisfiability, symbolic execution, &c) and less and less systems/network as that is getting larger-scale: like, writing whole-system emulators to reverse firmware targets.

What tools do you use to start with this part?
Are there crackmes specifically designed to hold your hand through taking first babby steps?


I'm fairly well-versed in assembly and compiler quirks, but outside of crackmes real world programs of today are just so fucking massive. I have no problems solving the "difficult" rated crackmes on crackmes.de for instance, because they throw you the relevant code in the face. Though I am really struggling just finding the serial algorithm for a small, real world program. There is so much to strip away just to get at the core.

start with C++ tutorials on YouTube, google anything u don't understand (Stack Owerflow got me most of answers), search GitHub for some code examples, and ofc buy some books( I personaly didn't use any book for programming).

After some time with C++ start with C# (Visual Studio 2015 is badass imo).

To start hacking u need a lot of fundamentals (and to know roots I quess...), for that u will need books, most tutorials on YouTube are shit. First u need to learn how to use hacking tools, only after that u will understand how to program one (like keylogger and worm). And ofc use some already made exploits to understand how to make ones.

Check Offensive Security and OWASP. They have exploit database and virtual labs.

For XSS (cross site scripting) u will need to know some PHP and JavaScript (and overall some HTML and CSS, its web afterall)

For SQL injection u will need to learn some database languages, PostgreSQL, MySQL ect. (same shit).

Here are some good books that i read. Tho there is much more to hacking and i rly dont have patience to write all the stuff.

Gray Hat Hacking The Ethical Hackers Handbook

Hacking Exposed Web 2.0

Hacking Exposed Malware and Rootkits (and all other Hacking Exposed series)

The Hackers Underground Handbook (this is oldschool book)

Metasploit

(just go google for books and check reviews on formus)

I assume you used the book cover for illustrative purposes. I read it when I was an edgy teenager and it was more a low-level system architecture book and compiler book. It's prerequisite knowledge for security stuff, but not comprehensive.

There are amazing pentesting books for python.

>(a) native-level proficiency with C and the memory hierarchy that C tries to abstract (ie: you want to understand what goes in registers, when, and why, and how a stack frame is laid out and why)
Check.

>(b) at least limited working proficiency with compiler theory, most especially the analysis of control flow graphs
Check.

>Understanding compiler IRs (particularly LLVM) is getting more important. Both exploit dev and reversing is becoming more and more theoretical (predicate translations and satisfiability, symbolic execution, &c) and less and less systems/network as that is getting larger-scale: like, writing whole-system emulators to reverse firmware targets.
Agreed.

When do I get my haxor diploma?

I want to learn more about the low-level stuff, like computer architecture, assembly, how operating systems work, etc. Is "Computer Systems, A Programmer’s Perspective" a good book to start

Here's a good place to start: wiki.osdev.org

this is great. thanks!

when i try to use an html injection to mess around with my profile on a website the site just takes what i've entered and saves it as text instead of being tricked into thinking that the text includes tags that are meant to be there

any ideas?

intel manuals. now kill yourself

> Jews "paying for things"

So you're poor and are a racist lacking even the basic knowledge of race stereotypes.

Don't be a one-trick pony, if the site is secure against XSS, try something else or try somewhere else.

The difference between a script kiddie and a hacker is one of them can thnk.