From Gender and Tech Resources
Learn about reverse engineering and backdooring hosts, discover memory corruption, code injection, and general data- or file-handling flaws that may be used to instantiate arbitrary code execution vulnerabilities.
First some preps that make life a little easier. Metasploit can be used in the environment of the bash shell.
Disassembly is the process of reversing the effect of code compilation as much as possible. And does not make sense at all if you know nothing about the parts of your processor that are made visible to machine instructions. Minimally you need to know about its registers (which can be bit-vector/integer, floating point, machine address), how Arithmetic Logic Units work, how clocking circuits works and why some instructions take more than one clock, how first and second level caches work, how Memory Management Units and Direct Memory Access work, etc.
News & watchdogs
- Phrack http://www.phrack.com/
- Academy of Reverse Engineering http://www.woodmann.com (ancient academy projects http://www.woodmann.com/fravia/academy.htm)
- DigiCrime, Inc. http://www.digicrime.com/dc.html
- Guide to Lock Picking http://www.lysator.liu.se/mit-guide/mit-guide.html