Differences

This shows you the differences between two versions of the page.

Link to this comparison view

cns:resources:documentation [2015/10/07 16:39]
razvan.deaconescu [Documentation]
cns:resources:documentation [2016/10/02 19:32] (current)
razvan.deaconescu
Line 5: Line 5:
 ===== Bibliography ===== ===== Bibliography =====
  
-  *[[http://​www.amazon.com/​Secure-Coding-Robert-C-Seacord/​dp/​0321335724|Robert Seacord - Secure Coding in C and C++, Addison Wesley Professional,​ 2005]] +  * [[http://​www.amazon.com/​Secure-Coding-Robert-C-Seacord/​dp/​0321335724|Robert Seacord - Secure Coding in C and C++, Addison Wesley Professional,​ 2005]] 
-  *[[http://​www.amazon.com/​CERT-Secure-Coding-Standard/​dp/​0321563212|Robert Seacord - The CERT C Secure Coding Standard, Addison Wesley Professional,​ 2008]] +  * [[http://​www.amazon.com/​CERT-Secure-Coding-Standard/​dp/​0321563212|Robert Seacord - The CERT C Secure Coding Standard, Addison Wesley Professional,​ 2008]] 
-  *[[http://​www.amazon.com/​Security-Warrior-Cyrus-Peikari/​dp/​0596005458|Anton Chuvakin, Cyrus Peikari - Security Warrior, O'​Reilly,​ 2004]] +  * [[http://​www.amazon.com/​Security-Warrior-Cyrus-Peikari/​dp/​0596005458|Anton Chuvakin, Cyrus Peikari - Security Warrior, O'​Reilly,​ 2004]] 
-  *[[http://​www.amazon.com/​Gray-Hacking-Ethical-Hackers-Handbook/​dp/​0071742557|Grey Hat Hacking. The Ethical Hacker'​s Handbook, 3rd Edition, McGraw Hill, 2011]] +  * [[http://​www.amazon.com/​Gray-Hacking-Ethical-Hackers-Handbook/​dp/​0071742557|Grey Hat Hacking. The Ethical Hacker'​s Handbook, 3rd Edition, McGraw Hill, 2011]] 
-  *[[http://​www.amazon.com/​Guide-Kernel-Exploitation-Attacking-Core/​dp/​1597494860|Enrico Perla, Massimiliano Oldani - A Guide to Kernel Exploitation,​ Syngress, 2011]] +  * [[http://​www.amazon.com/​Guide-Kernel-Exploitation-Attacking-Core/​dp/​1597494860|Enrico Perla, Massimiliano Oldani - A Guide to Kernel Exploitation,​ Syngress, 2011]] 
-  *[[http://​www.amazon.com/​Hacking-Art-Exploitation-Jon-Erickson/​dp/​1593271441|Jon Erickson - The Art of Exploitation,​ 2nd Edition, No Starch, 2008]] +  * [[http://​www.amazon.com/​Hacking-Art-Exploitation-Jon-Erickson/​dp/​1593271441|Jon Erickson - The Art of Exploitation,​ 2nd Edition, No Starch, 2008]] 
-  *[[http://​www.amazon.com/​Hacking-Exposed-Malware-Rootkits-Solutions/​dp/​0071591184|Michael A. Davis, Sean M. Bodmer, Aaron LeMasters - Hacking Exposed. Malware and Rootkits, McGraw Hill, 2010]] +  * [[http://​www.amazon.com/​Hacking-Exposed-Malware-Rootkits-Solutions/​dp/​0071591184|Michael A. Davis, Sean M. Bodmer, Aaron LeMasters - Hacking Exposed. Malware and Rootkits, McGraw Hill, 2010]] 
-  *[[http://​www.amazon.com/​Applied-Cryptography-Protocols-Algorithms-Source/​dp/​0471117099|Bruce Schneier - Applied Cryptography,​ John Wiley & Sons, 1996]]+==== Crypto ==== 
 +  * http://​cryptopals.com/​ 
 +  * https://​en.wikipedia.org/​wiki/​Template:​Cryptography_hash 
 +  * https://​blog.skullsecurity.org/​2013/​a-padding-oracle-example 
 +  * http://​crypto.dei.polimi.it/​doku.php?​id=courses:​csdd 
 +  * https://​class.coursera.org/​crypto-preview/​lecture 
 +  * [[http://​www.amazon.com/​Applied-Cryptography-Protocols-Algorithms-Source/​dp/​0471117099|Bruce Schneier - Applied Cryptography,​ John Wiley & Sons, 1996]] 
 +===== Wargames ===== 
 + 
 +This are (online) games where you can polish your h4x0r sk1llz. 
 + 
 +  * Matasano Microcorruption:​ https://​microcorruption.com/​ 
 +  * Matasano Crypto Pals: http://​cryptopals.com/​ 
 +  * Practice CTF List: http://​captf.com/​practice-ctf/​ 
 +  * SmashTheStack:​ http://​smashthestack.org/​ 
 +    * [[http://​io.smashthestack.org:​84/​|IO]] 
 +  * OverTheWire:​ http://​www.overthewire.org/​wargames/​ 
 +  * WeChall: http://​www.wechall.net/​ 
 +  * W3Challs: https://​w3challs.com/​ 
 +  * Vuln Hub: http://​vulnhub.com/​ 
 + 
 +===== Getting Started ===== 
 + 
 +If you're making your first steps in the world of binary analysis, assembly and runtime application security, we recommend you to browse the resources below: 
 +  * The book [[http://​www.amazon.com/​Computer-Systems-Programmers-Perspective-Edition/​dp/​0136108040|Computer Systems: A Programmer'​s Perspective]] 
 +  * [[http://​elf.cs.pub.ro/​asm/​wiki/​laboratoare/​home|Labs for the Assembly Class in ACS/UPB]] 
 +  * The book [[http://​www.plantation-productions.com/​Webster/​www.artofasm.com/​index.html|The Art of Assembly]] 
 +  * [[https://​picoctf.com/​|picoCTF]]:​ a simple CTF-style game to get accustomed to security tasks, tools and CTF games 
cns/resources/documentation.1444225171.txt.gz · Last modified: 2015/10/07 16:39 by razvan.deaconescu
CC Attribution-Share Alike 3.0 Unported
www.chimeric.de Valid CSS Driven by DokuWiki do yourself a favour and use a real browser - get firefox!! Recent changes RSS feed Valid XHTML 1.0