CategoryRed

Art of Exploitation: A Hands-On Journey

From my experience, this book is not for the faint of heart and while it does teach a lot, it does not hold your hand.  I (so far) have noticed it spends a brief amount of time on stuff I understood, and immediately jumps into the “hard stuff”.

I would describe this book as a good separator for the people that say “I can kinda read code but not really understand code” to learning how code works and understanding things like buffer overflows or references to assembly in jokes. Yeah my friends are cool like that!

After finishing the first chapter a friend suggested creating an article thinking it would be useful and I was like, “yeah that’s a good idea, and for those that have already read it, it will be a good refresher.

Continue reading

Part 2 or What makes a “good” Conference?

I often mention how much I attend conferences, and often asked what makes a good conference.  I’ve been to many over the last five years, and not just Information Security, or even technology conferences, but for the sake of context I’ll use Security conferences as examples. I’ll mention some factors in how I define a good conference then a summary.

Continue reading