This shows you the differences between two versions of the page.
cns:resources:documentation [2013/10/07 12:49] 127.0.0.1 external edit |
cns:resources:documentation [2016/10/02 19:32] (current) razvan.deaconescu |
||
---|---|---|---|
Line 1: | Line 1: | ||
====== Documentation ====== | ====== Documentation ====== | ||
- | *Use cs.curs.pub.ro account to access documentation: https://elf.cs.pub.ro/oss/res/doc/. | + | Use cs.curs.pub.ro account to access documentation: https://elf.cs.pub.ro/oss/res/doc/ |
===== Bibliography ===== | ===== Bibliography ===== | ||
- | *[[http://www.amazon.com/Secure-Coding-Robert-C-Seacord/dp/0321335724|Robert Seacord - Secure Coding in C and C++, Addison Wesley Professional, 2005]] | + | * [[http://www.amazon.com/Secure-Coding-Robert-C-Seacord/dp/0321335724|Robert Seacord - Secure Coding in C and C++, Addison Wesley Professional, 2005]] |
- | *[[http://www.amazon.com/CERT-Secure-Coding-Standard/dp/0321563212|Robert Seacord - The CERT C Secure Coding Standard, Addison Wesley Professional, 2008]] | + | * [[http://www.amazon.com/CERT-Secure-Coding-Standard/dp/0321563212|Robert Seacord - The CERT C Secure Coding Standard, Addison Wesley Professional, 2008]] |
- | *[[http://www.amazon.com/Security-Warrior-Cyrus-Peikari/dp/0596005458|Anton Chuvakin, Cyrus Peikari - Security Warrior, O'Reilly, 2004]] | + | * [[http://www.amazon.com/Security-Warrior-Cyrus-Peikari/dp/0596005458|Anton Chuvakin, Cyrus Peikari - Security Warrior, O'Reilly, 2004]] |
- | *[[http://www.amazon.com/Gray-Hacking-Ethical-Hackers-Handbook/dp/0071742557|Grey Hat Hacking. The Ethical Hacker's Handbook, 3rd Edition, McGraw Hill, 2011]] | + | * [[http://www.amazon.com/Gray-Hacking-Ethical-Hackers-Handbook/dp/0071742557|Grey Hat Hacking. The Ethical Hacker's Handbook, 3rd Edition, McGraw Hill, 2011]] |
- | *[[http://www.amazon.com/Guide-Kernel-Exploitation-Attacking-Core/dp/1597494860|Enrico Perla, Massimiliano Oldani - A Guide to Kernel Exploitation, Syngress, 2011]] | + | * [[http://www.amazon.com/Guide-Kernel-Exploitation-Attacking-Core/dp/1597494860|Enrico Perla, Massimiliano Oldani - A Guide to Kernel Exploitation, Syngress, 2011]] |
- | *[[http://www.amazon.com/Hacking-Art-Exploitation-Jon-Erickson/dp/1593271441|Jon Erickson - The Art of Exploitation, 2nd Edition, No Starch, 2008]] | + | * [[http://www.amazon.com/Hacking-Art-Exploitation-Jon-Erickson/dp/1593271441|Jon Erickson - The Art of Exploitation, 2nd Edition, No Starch, 2008]] |
- | *[[http://www.amazon.com/Hacking-Exposed-Malware-Rootkits-Solutions/dp/0071591184|Michael A. Davis, Sean M. Bodmer, Aaron LeMasters - Hacking Exposed. Malware and Rootkits, McGraw Hill, 2010]] | + | * [[http://www.amazon.com/Hacking-Exposed-Malware-Rootkits-Solutions/dp/0071591184|Michael A. Davis, Sean M. Bodmer, Aaron LeMasters - Hacking Exposed. Malware and Rootkits, McGraw Hill, 2010]] |
- | *[[http://www.amazon.com/Applied-Cryptography-Protocols-Algorithms-Source/dp/0471117099|Bruce Schneier - Applied Cryptography, John Wiley & Sons, 1996]] | + | ==== Crypto ==== |
+ | * http://cryptopals.com/ | ||
+ | * https://en.wikipedia.org/wiki/Template:Cryptography_hash | ||
+ | * https://blog.skullsecurity.org/2013/a-padding-oracle-example | ||
+ | * http://crypto.dei.polimi.it/doku.php?id=courses:csdd | ||
+ | * https://class.coursera.org/crypto-preview/lecture | ||
+ | * [[http://www.amazon.com/Applied-Cryptography-Protocols-Algorithms-Source/dp/0471117099|Bruce Schneier - Applied Cryptography, John Wiley & Sons, 1996]] | ||
+ | ===== Wargames ===== | ||
+ | |||
+ | This are (online) games where you can polish your h4x0r sk1llz. | ||
+ | |||
+ | * Matasano Microcorruption: https://microcorruption.com/ | ||
+ | * Matasano Crypto Pals: http://cryptopals.com/ | ||
+ | * Practice CTF List: http://captf.com/practice-ctf/ | ||
+ | * SmashTheStack: http://smashthestack.org/ | ||
+ | * [[http://io.smashthestack.org:84/|IO]] | ||
+ | * OverTheWire: http://www.overthewire.org/wargames/ | ||
+ | * WeChall: http://www.wechall.net/ | ||
+ | * W3Challs: https://w3challs.com/ | ||
+ | * Vuln Hub: http://vulnhub.com/ | ||
+ | |||
+ | ===== Getting Started ===== | ||
+ | |||
+ | If you're making your first steps in the world of binary analysis, assembly and runtime application security, we recommend you to browse the resources below: | ||
+ | * The book [[http://www.amazon.com/Computer-Systems-Programmers-Perspective-Edition/dp/0136108040|Computer Systems: A Programmer's Perspective]] | ||
+ | * [[http://elf.cs.pub.ro/asm/wiki/laboratoare/home|Labs for the Assembly Class in ACS/UPB]] | ||
+ | * The book [[http://www.plantation-productions.com/Webster/www.artofasm.com/index.html|The Art of Assembly]] | ||
+ | * [[https://picoctf.com/|picoCTF]]: a simple CTF-style game to get accustomed to security tasks, tools and CTF games |