Skip to main content

Home

Binary Analysis Cookbook is Out Now!

It was a labor of love for more than nine (9) months but I am pleased to announce that my book "Binary Analysis Cookbook" is now available from your favorite book store! I also made it easy to pick up a copy. Go to https://binaryanalysiscookbook.com and use the navigation links at the bottom of the home page to pick up your copy from your favorite reseller!
I wrote a blog post sharing my experience working with PACKT as a publisher if you've ever considered writing a book for them. You can read that post at https://blog.blu3gl0w13.com/2019/10/binary-analysis-cookbook-process-and.html.
I wrote this book to hit a specific audience looking to get into ELF Binary Analysis. It's beginner friendly and anyone with little to no experience can pick up this book and get started learning how to analyze ELF binaries. This book gives you all the tools and techniques you need to begin learning the intricacies of beginning Binary Analysis and serves as a jumping off point into more advanced books on the topic. The feedback I have received so far on LinkedIn, Facebook, Twitter, and Instagram has been so positive, so thank you for that support! If you're a student, or looking to switch careers, this book is definitely for you!

Popular posts from this blog

SLAE/SLAE64 Course Review

  After recently finishing both the SLAE ( http://www.securitytube-training.com/online-courses/securitytube-linux-assembly-expert/index.html ) and SLAE64 ( http://www.securitytube-training.com/online-courses/x8664-assembly-and-shellcoding-on-linux/index.html ) courses available through SecurityTube Training, and earning both certifications, I thought I would write a review of the training itself. Personally, I chose these course as a way to learn Assembly in preparation for the Crack The Perimeter (CTP) course and OSCE certification. After taking the Pentesting With Kali (PWK) class and earning the OSCP, I knew I needed to fill some gaps in my knowledge, and specifically with C and Assembly programming. Seeing that there aren't many training offerings that aim to teach Assembly specific to penetration testing and shellcoding, I gave SLAE a try.   If you don't care about the certification itself, you can obtain all of SecurityTube's videos for a small monthly fee through P

SLAE32 - Assignment 6

This is a continuation of a seven (7) part series for the SLAE32 Certification challenge. You can read the first five (5) parts here: Part 1 - Assignment 1 Part 2 - Assignment 2 Part 3 - Assignment 3 Part 4 - Assignment 4 Part 5 - Assignment 5 The requirements for this assignment are as follows: Take up 3 shellcodes from Shell-Storm and create polymorphic versions of them to beat pattern matching The polymorphic versions cannot be larger 150% of the existing shellcode Bonus points for making it shorter in length than original Full code can be found on GitHub here: https://github.com/blu3gl0w13/SLAE32/tree/master/assignment-6 Supplemental scripts developed for this class can be found on GitHub here: https://github.com/blu3gl0w13/SLAE32/tree/master/scripts

SLAE32 - Assignment 1

In preparation for the next Offensive Security certification class and challenge (CTP and OSCE), I decided to invest some time and energy into the Security Tube Linux Assembly Expert 32-bit class. That way I can have a solid foundation in understanding the finer workings of Assembly. Especially since my focus for my second Bachelor's degree was more along the lines of system administration and back-end web development instead of the programming focus of Computer Science. Still, I never stop with my learning and barely slow down at times. This was the first assignment out of seven (7) and the requirements for assignment one (1) were as follows: Create a Shell_Bind_TCP shellcode Binds to a port Execs shell upon connection The PORT number should be easily configurable This is a pretty standard request but I must admit the process was only somewhat familiar. I knew I could write the code pretty easily once I understood the process. For this, I had to fall back on my love