Skip to content

Instantly share code, notes, and snippets.

@sylvia43
Last active April 5, 2016 19:14
Show Gist options
  • Save sylvia43/d7022113e9c5ae9695ab to your computer and use it in GitHub Desktop.
Save sylvia43/d7022113e9c5ae9695ab to your computer and use it in GitHub Desktop.
Penetration Testing and Security Resources

This is a comment by Shane Wilton in this post from HH Information Security.


Start with MicroCorruption to familiarize yourself with reverse engineering and exploit development. It's ~18 challenges, entirely on the website, that task you with reverse engineering MSP-430 programs, and developing exploits against them.

From there, Pwnable.kr has another few dozen exploitation challenges. These are more real-world, but ramp up in difficulty quickly. The first block should be doable by anyone with Linux experience though.

If you're starting from the very beginning, keep Hacking: The Art of Exploitation nearby. It's a very good primer for all of this stuff. Once you work your way through that, TAOCP is considered a bible of sorts for vulnerabilities. It hasn't aged a day since 2006, and will teach you, in intimate detail, how memory corruption vulnerabilities work, and how to exploit them.

For a more general set of resources, here's a reading list put together by tptacek (Creator of Matasano Security and MicroCorruption). On that list Cryptography Engineering: Design Principles and Practical Applications is a favourite of mine, and is an incredible introduction to cryptography, for software engineers.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment