Skip to content

Latest commit

 

History

History
 
 

2015-Fall

Hack Night - Fall 2015

Topics

  • Python Exploitation
  • Network Reconnaissance
  • Web Exploitation
  • Introduction to C
  • Reverse Engineering
  • Binary Exploitation

Setup

In order to do most of the things talked about, you are going to need some sort of Linux virtual machine. First, if you don't already have one, you will need some sort of Virtual Machine software. We suggest either VMware Player (preferable if you have Windows), VMware Fusion (preferable if you have a Mac), or Virtual Box (any operating system and free).

You will also need to download a linux distribution (our personal suggestion is Kali Linux, just pick the download for the software you have), and here's some reading about Linux).

You are going to want to learn a basic level of command line knowledge and for that you can check this out. If you want a more in depth tutorial check this out.