============
- A Guide to Kernel Exploitation Attacking the Core
- Computer Networking A Top-Down Approach
- Fuzzing Brute Force Vulnerability Discovery
- Gray Hat Python - Python Programming for Hackers and Reverse Engineers (2009)
- Hacking - The Art of Exploitation, 2nd Ed.
- Metasploit, Penetration Testers Guide
- Modern Operating Systems, 3rd Ed.
- Reversing - Secrets Of Reverse Engineering (2005)
- The Art of Assembly Language, 2nd Ed.
- The Mac Hacker's Handbook
- The IDA Pro Book, 2nd Ed. (2011)
- The ShellCoder's Handbook - Discovering and Exploiting Security Holes, 2nd Ed.
- Gray Hat Hacking, 3rd Ed.
- nasmdoc
Long story short: pick a system, pick an area of interest, and go wild.
For exploitation techniques in general (UNIX and Linux focused):
- Start with Hacking The Art of Exploitation Chapter 2 (0x200 Programming), beginning from section 5 (0x250 Getting your Hands Dirty), Chapter 3 (0x300 Exploitation), and Chapter 5 (0x500 Shellcode).
- Move to A Guide to Kernel Exploitation Attacking the Core and read Part 1 A Journey to Kernel Land.
- Do CTF practice exercises concerning privilege escalation and memory corruption (this is not really a third step, just do them while you read).
- Exploit-Exercises
- Smash The Stack
- Over The Wire
- Root Me : Hacking and Information Security learning platform
- Binary Auditing
- Salted Password Hashing - Doing it Right
- Mac Developer Library - Memory Management Programming Guide for Core Foundation - Byte Ordering
- Rogunix Docs
- CTF Field Guide
- Aleph One's Smashing the Stack for Fun and Profit
- Pentestmonkey’s Blog
- Metasploit Unleashed
- g0tmi1k – Basic Linux Privilege Escalation Reference
- Corelan Team | Exploit writing tutorial part 1 : Stack Based Overflows
- Corelan Team | Exploit writing tutorial part 2 : Stack Based Overflows – jumping to shellcode
- Corelan Team | Exploit writing tutorial part 3 : SEH Based Exploits
- Corelan Team | Exploit writing tutorial part 3b : SEH Based Exploits – just another example
- Corelan Team | Exploit writing tutorial part 6 : Bypassing Stack Cookies, SafeSeh, SEHOP, HW DEP and ASLR
- Corelan Team | Exploit writing tutorial part 8 : Win32 Egg Hunting
- Safely Searching Process Virtual Address Space by skape
- Smashing The Modern Stack For Fun And Profit By Craig J. Heffner
- SEED Labs – Buffer Overflow Vulnerability Lab
- Using SHORT (Two-byte) Relative Jump Instructions
- SLAE Assignment 5: Analyzing msfpayload shellcode
- x64 Architecture Register Reference
- Using Backtrack to spot and fix bad characters in custom buffer-overflow development
- The Other Kind of Patch
- Modern Cryptanalysis: Techniques for Advanced Code Breaking [ISBN: 978-0-470-13593-8]
- Modern Operating Systems, 4th Ed. [ISBN: 0-13-359162-X]
- /r/netsec
- /r/reverseeningeering
- /r/securityctf
- /r/OpenToAllCTFteam
- /r/netsec2
- /r/netsec_uncensored
- /r/netsec/students
- /r/pwned
- /r/computerforensic
- /r/computerforensics
Some (most) resources taken from: NSIMATTSTILES
Until Copyright infringement do us part.