this post was submitted on 28 Nov 2023
17 points (100.0% liked)
technology
23218 readers
2 users here now
On the road to fully automated luxury gay space communism.
Spreading Linux propaganda since 2020
- Ways to run Microsoft/Adobe and more on Linux
- The Ultimate FOSS Guide For Android
- Great libre software on Windows
- Hey you, the lib still using Chrome. Read this post!
Rules:
- 1. Obviously abide by the sitewide code of conduct. Bigotry will be met with an immediate ban
- 2. This community is about technology. Offtopic is permitted as long as it is kept in the comment sections
- 3. Although this is not /c/libre, FOSS related posting is tolerated, and even welcome in the case of effort posts
- 4. We believe technology should be liberating. As such, avoid promoting proprietary and/or bourgeois technology
- 5. Explanatory posts to correct the potential mistakes a comrade made in a post of their own are allowed, as long as they remain respectful
- 6. No crypto (Bitcoin, NFT, etc.) speculation, unless it is purely informative and not too cringe
- 7. Absolutely no tech bro shit. If you have a good opinion of Silicon Valley billionaires please manifest yourself so we can ban you.
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
These books are quite outdated or redundant with freely available courses. It's definitely not worth it, in my opinion.
Interesting! Are there any which are still current in your opinion? What courses would replace the ones which are redundant?
I disagree with the commenter above. NoStarch publishes some of the best security books. Personally, my expertise is in binary exploitation and reverse engineering. The Malware book is great for learning the basics of reverse engineering. Sure a lot of modern Malware is more advanced and using crazy, custom packers and anti-debug techniques. But you'll never learn how to write a custom unpacker if you haven't even learned how to read assembly or defeat basic anti-debugging techniques.
Similar with Hacking: The Art of Exploitation. Yes it largely focuses on exploiting vulnerable apps like it's 1995, no anti-exploit mitigations like NX, ASLR, stack cookies, etc. but binary security has been an iterative process. You won't understand NX or how/why you need a ROP chain if you don't already understand how stack overflows and shellcode work. Starting with a binary resembling one from the 90's is exactly how any class, course, training material, or book on binary exploitation will start, assuming it's intended for beginners.