Xorsysd

Members
  • Content count

    5
  • Joined

  • Last visited

Community Reputation

0 Neutral

About Xorsysd

  • Rank
    Will I break 10 posts?
  • Birthday 06/13/1984

Contact Methods

  • AIM
    BlindTeky
  • MSN
    markmelonson@hotmail.com
  • Website URL
    http://www.xorsysd.org
  • ICQ
    0
  • Yahoo
    BlindTechie

Profile Information

  • Interests
    Current obsessions: Caffeine, Wine, Music, Special purpose programming (Net, DB, Web, AI, Games, etc...), "Applied Security", Crypto, (h355, books, etc...<br /><br />Seeking information on: Phone systems, Vulnerability research, RCE, etc...
  • Location
    Houston, TX
  1. Scratch me off the list... Invoices won't be ready, phundage allows only for Ramen and diapers (no Cons [this year]). I guess I'll just have to live through ya'll this time!
  2. Once upon a time ago, I wrote a college essay entitled, "Breaking the Hacker Stereotypes", it discusses origons of the term and stuff... It is also work-cited. E-mail me if you are interested.
  3. Count me in! I'll be the blind fux0r with the hot wife (handle pending... Possibly [Ms.Entropy])
  4. Forums aren't really the best way to discuss exploits... To all who claim n00b status and are interested in exploits, vulnerabilities, etc... Get "Hacking: The Art of Exploitation", it teaches the fundamentals and creates a solid foundation for expanding your mind / skills in Exploit R&D. If you want to know about new vulnerabilities and exploits, learn about vulnerabilities and exploits, then get on mailing lists like bugtraq, full-disclosure, etc...
  5. The Art of Deception is certainly entertaining to my sick sense of things, but as stated previously, trailled off about half-way through the book as things were rehashed in different situations. This and the Stealing the Network series are good for kicks... I'd definetly recommend the Stealing the Network series... As far as hacking, I'd have to recommend among programming books, Hacking: The Art of Exploitation, this is a wonderful read and is essential in my opinion. Security Warrior is definetly on the list, because as it states in the foreword, it is meant to build on already acquired skills and attempt to sharpen them or introduce you to new skills and point you in the right direction... Network Network Security Tools is another good read / reference for building and expanding tools... Further down the road, after certain programming (C, Assembly, etc...) foundation is secured, I'd recommend Hacker Disassembly Uncovered, The ShellCoder's Handbook and Exploiting Software: How to Break Code, this is not only an enjoyable, but also very informative. Probably the best advice that I can offer to anyone asking about books is: When selecting books, be aware of the fundamentals, check to see who the author is writing the book for, and first start with books that build an adequate foundation for future purchases.