CategoryRed

Vulnhub: A “safe space” to level up

You may be already aware of how broad Information Security is and there are many avenues to explore.  I had narrowed down what I wanted to focus on and it boiled down to a combination of things I was already familiar with from working in regular IT, and some things I had not done before.

While some of my interests lean toward the day job of protecting an organization one way or another, there are plenty of ways to use these skills and have some fun in a constructive manner and without breaking the law.  One thing that wasn’t mentioned that often in my earlier years of learning about the security/hacking culture was how to build those skills without causing real world damage.

I often ran into a couple of questions regarding how I would sharpen my skills which were partially answered by setting up a home lab; however, its not like any or everyone plans to build a large lab in their home.  I wasn’t necessarily working toward just applying these skills to the day job as I tend to enjoy doing Capture the Flag events once in awhile and sometimes I want to practice on something I’m even less familiar with.

Continue reading

Hacking: Art of Exploitation Part I (0x100-0x200)

Summary

After an introduction to the history of hacking, the book starts off with the first chapter talking about control structures, followed by some examples of pseudo-code.  If you are not already familiar with control structures, it would be wise to do further reading.  This is one of the most fundamental concepts of programming.

 

Continue reading