- Thread Author
- #1
You must be registered for see images
1)LEARN C this pretty much rosseta stone of computer programming languages from javascript to perl are built on top of C.>
You must be registered for see medias
>
You must be registered for see links
>
You must be registered for see links
2)Reverse Engineering is next part of process
> begin
You must be registered for see links
The Nightmare course is our main binary exploitation track, but the first 4 chapters are about learning the tools and RE. Work throught the first 4 sections until you get to the overflows section, then come on back to RE.
>work back through h0mbre C using GDB and Ghidra for every assignment. This takes a while, but is a really good way to get familar with how to do Linux reverse engineering and become comfortable with disassembly:
You must be registered for see links
3)MALWARE RE once you have become apt in reverse engineering you can start reverse engineering malware
>
You must be registered for see links
>
You must be registered for see links
4)Build your own malware and exploits