Reverse Engineering and Exploit Development Made Easy - Chapter 1
Table of Contents:
Overview
Dedication
A Word of Warning!
Section 1: Getting Comfortable with Kali Linux
Section 2: Essential Tools in Kali
Section 3: Passive Reconnaissance
Section 4: Active Reconnaissance
Section 5: Vulnerability Scanning
Section 6: Buffer Overflows
Section 7: Handling Public Exploits
Section 8: Transferring Files to your target
Section 9: Privilege Escalation
Section 10: Client-Side Attacks
Section 11: Web Application Attacks
Section 12: Password Cracking
Section 13: Port Redirection and Pivoting
Section 14: Metasploit Framework
Section 15: Antivirus Bypassing
Extra Resources
Setting up your Pentesting Environment
Wargames/Hands-on Challenges
Capture the Flag Competitions (CTFs)/Cyber Competitions
Bug Bounty Programs
Vulnerable Machines
Tips to participate in the Proctored OSCP exam
Other Resources
Conclusion
Dedication:
Before I start discussing about my journey, I have a few people that I want to dedicate this blog post.
Many of you may already know this, but as of March 15, 2017 NetSecFocus decided to migrate our community to our own Mattermost server. There were a few reasons for this with the main reasons being message retention in Slack. At our volume messages were only lasting for a maximum of 10 hours which made it impossible to search for anything meaningful. Due to this and the impossibility of paying about $12k USD/month for Slack we decided to ditch it for something better.