Have an account?
It looks like you're new here. If you want to get involved, click one of these buttons!
Apply for Membership
Who's Online (1)
Looking to introduce yourself? Look no further, and click here! We also have IRC! [irc.evilzone.org #iexploit]
General Security Discussions
Where should I go from here
Hey guys I have been a member on here for a few months with little activity. I had broke my laptop and recently replaced it. I am a security and risk analysis: cyber security major. I have a pretty good technical background as well as some basic metasploit hacking knowledge. I am a white hatter although my degree would qualify me for a pen tester (with some certs of course). That being said I have found that by understanding exploits you understand a great deal about protecting yourself as well. This is because of the hands on approach picking apart vulnerabilties. To get to the point I'm looking for maybe some direction within that area. I know there are rules against posting blackhat material so I figured I'd ask here. Any help would truly be appreciated. It could be an article that I should read or anything. Basically i am looking for a good place to start to broaden my knowledge in this and all ares encompassed by Information Technology.
Thanks in advance,
I suggest you start looking into all kinds of overflows ;) (buffer overflow, heap overflow, etc...)
If you want to learn overflows and the like then the best guides out there are by the corelan team - specifically peter van eeckhoutte.
The first tutorial:
http://www.corelan.be/index.php/2009/07 ... overflows/
If you're going to look at buffer overflows, i really suggest working on smashthestack.org challenges :D
For buffer overflows you will need at the very least basic knowledge of reverse engineering and assembly language so i would learn that first. There is no fasttrack way to doing it im afraid.
Add a Comment