Posts

Showing posts from September, 2014

Blackhat and Defcon Article Posted on EthicalHacker.net and Book Giveaway #1

Image
My “A First-Timer’s Experience at Black Hat and DEFCON” article I talked about in my last post is now live on the front page of ethicalhacker.net along with a picture of Kevin Mitnick and I. When the article went live earlier this week I couldn’t help inserting a mental caption of “A hacker & a hack” when I saw the picture 🙂 Even though it wasn’t a technical article I’m still quite honored to have an article on the front page of ethicalhacker.net and it’s a nice reminder of the progress I’ve made over the past two and a half years. To spread around a little of the good fortune I’m going to give away some books that I already had copies of but got additional copies of at Blackhat. I’m limiting the book giveaways to U.S. residents only to keep the shipping costs down but after all the book’s are given away I’ll think of a small giveaway that I’ll open up for everyone. Giveaway #1 is for one paperback copy of “The Practice of Network Security Monitoring” by Richard Bejtlich. It’s a

Pentesteracademy.com x86 Assembly Language and Shellcoding on Linux Course Review

Most people interested in information security have likely visited SecurityTube.net before but for those who haven’t it’s a great aggregator for videos of tutorials, demonstrations and conferences. The site’s owner Vivek Ramachandran has produced a ton of free content and a few paid courses. Late last year he transitioned all of his premium courses to a new site at pentesteracademy.com where you can access all of his courses for a monthly $39 fee. I recently finished going through his “x86 Assembly Language and Shellcoding on Linux” course and wanted to share my thoughts on it. Before watching his videos I knew almost nothing about Assembly language or shellcode but I did know that I needed to have a good understanding of both in order to be any good at reverse engineering and exploit development. The first seven or so videos cover a lot of system architecture and explain what the different registers are and how they’re used. This is a very tricky section because he’s explaining thing