The very basics.
First we look at counting and why binary exists. Second we look at Hexadecimal, Third we look at the components of a computer and how they work.
The second section we begin to review Linux systems and elementary exploits.
The third section is devoted to lock picking and hoping something developed farther.
- Computing
- Introduction to Security Research
- Introductions to Security Research – Windows
- Introduction to Security Research – Vulnerable Win 10 Setup
- Introductions to Security Research – Windows – Permissions
- Introductions to Security Research – Win – Privilege Escalation Tools
- Introductions to Security Research – Win – Service Exploits
- Introductions to Security Research – Win – Kernel Exploits
- Introductions to Security Research – Win – Additional Attacks
- Introductions to Security Research – Win – PowerShell and User Privs
- Introductions to Security Research – Win – Privilege Escalation Strategies
- Introduction to Security Research – Linux
- Overview of .EXE and .DLL Files in the .NET world
- ELF Binaries Overview
- Introductions to Security Research – Windows
- Introduction to Physical Penetration Test – Overview