[ / / / / / / / / / / / / / ] [ dir / animu / ausneets / b2 / choroy / dempart / doomer / tingles / vichan ][Options][ watchlist ]

/tech/ - Technology

You can now write text to your AI-generated image at https://aiproto.com It is currently free to use for Proto members.
Email
Comment *
Verification *
File
Select/drop/paste files here
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Expand all images

File (hide): 5a13c8c2079630f⋯.jpg (65.55 KB, 750x750, 1:1, 1559353180271.jpg) (h) (u)

[–]

 No.1067726>>1067729 >>1067758 [Watch Thread][Show All Posts]

Going for hackerman meme and oscp...i suck at coding and i know that, just switched to emacs (vim- not friendly/comfy enough, pycharm- too overwhelming and not enough like a terminal)which seems like the ide for me by far, wanna be competent enough in python and c to do haxxoring shit (make port scanners from scratch, buffer overflows, write my own exploits). Any resources u has /g/, i mean /tech/?

 No.1067729

>>1067726 (OP)

Honestly I try and keep as many normie faggots out of the "hacking" community because its just retards who think they are edgy. But everyone has to start somewhere.

I recommend having some coding goals that are non hacking and try them out. Then use the skills and syntax knowledge to be able to work independently, and only get theory online and not full in tutorials.


 No.1067731

strongly consider suicide IMHO.


 No.1067758

>>1067726 (OP)

>buffer overflows, write my own exploits

Read these in order, Art of exploitation by Jon erikson (a very condensed book, has intro to c and basic buffer overflows etc.), use the knowledge on eg. doing the exploitation challenges done by "Live overflow" youtube guy.

Art of software Security Assesment, (thicc book, it's about finding real vulnerabilities in real source code, C language obscurities, basic intro in security related context to file permissions, ipc, UNIX and windows, etc.)

Now comes the hard part, read actual source code and try to find vulnerabilities. The sooner you start the better. This is excruciatingly boring when you don't find anything and will make you feel like doing it less and less, prepare to spend hundreds of hours in exchange for nothing.

Once you inevitably get bored of reading source code try fuzzing, recommend afl/winafl because it can find real vulnerabilities once you spend enough time making so that the binary doesn't insta crash and does 100+ cycles a second instead of 2. Recommended book, Open source fuzzing tools or Fuzzing brute force vulnerability discovery, they overlap a lot.

Worthy mentions: A bug hunters diary (real examples of vulns in real software)

Web application hackers handbook (web app hacking obviously, old but still good read for basic understanding)

Blogs and other posts are useful once you have base foundation of knowledge. Google for them or browse infosec twitter etc.

Ethical hacking/ kali linux stuff is a meme.>>1067726




[Return][Go to top][Catalog][Screencap][Nerve Center][Cancer][Update] ( Scroll to new posts) ( Auto) 5
3 replies | 0 images | Page ?
[Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / animu / ausneets / b2 / choroy / dempart / doomer / tingles / vichan ][ watchlist ]