Monday, May 3, 2010

hacking: the art of exploitation

If you want to get into the low level molecular details of how exploits work and the systems they target work then read this very well done book by Jon Erickson: "Hacking: The Art of Exploitation".


Hacking: The Art of Exploitation, 2nd Edition

Saturday, May 1, 2010

List of Security Related Blogs / RSS Feeds

here we have a list of security related weblogs and RSS feeds:
use at will.
* www.0x000000.com
* blog.ncircle.com/
* blogs.technet.com/antimalware/default.aspx
* chuvakin.blogspot.com/
* ddanchev.blogspot.com/
* www.darkreading.com/
* www.darknet.org.uk
* www.defcon.org/
* www.doxpara.com
* dvlabs.tippingpoint.com/blog/
* eavesdropdc.blogspot.com/
* research.eeye.com/html/alerts/zeroday/index.html
* www.f-secure.com/weblog
* www.bing.com/travel/?cid=44
* www.fthe.net/blog
* seclists.org/#fulldisclosure
* googleonlinesecurity.blogspot.com/
* ha.ckers.org/blog
* honeyblog.org/
* www.insecuremag.com
* www.irongeek.com/
* www.macworld.com
* www.macosxhints.com
* www.mal-aware.org/
* www.malwarehelp.org
* blogs.technet.com/markrussinovich/default.aspx
* chargen.matasano.com/chargen/
* blog.metasploit.com/
* www.communities.hp.com/securitysoftware/blogs/msutton/default.aspx
* blogs.technet.com/mmpc/default.aspx
* milw0rm.com/
* www.oreillynet.com/
* www.offensivecomputing.net
* onlamp.com
* www.oreillynet.com/
* www.openpacket.org
* www.openrce.org/rss/feeds/blogs
* packetstormsecurity.org/
* pandalabs.pandasecurity.com/
* seclists.org/#pen-test
* port25.technet.com/default.aspx
* rbnexploit.blogspot.com/
* www.sans.org/reading_room/
* www.sans.org/webcasts/
* isc.sans.org
* www.sans.org/alerts/
* www.secguru.com
* secunia.com/virus_information/
* blogs.securiteam.com
* blogs.technet.com/srd/default.aspx
* www.securityfocus.com
* taosecurity.blogspot.com/
* www.thedarkvisitor.com
* www.ethicalhacker.net
* blogs.technet.com/msrc/default.aspx
* websense.com/securitylabs/
* xfruits.com/aludwig/
* www.zone-h.org/rss/news


Blog services