Hey guys! I figured that it would be beneficial to have an entire post dedicated to teaching some fundamentals about Computer Organization and the x86 Instruction Set Architecture, since I will be referencing this particular ISA (instruction set architecture) throughout most of my tutorials on Exploit Development and Reverse Engineering. This will be updated over
Category: Vulnerability Lab Setup
Part 3 of creating my Wargame to teach people exploit development and reverse engineering.
Intro to makefiles, BASH scripts, and making a simple buffer overflow program.
An introduction and learning experience with Vagrant and creating a wargame.
Originally, I wrote an article on installing a PfSense VM for a home pentesting lab. However, I am changing the entire virtualization suite we will use. I am migrating to installing VMWare ESXI from start to finish and setting up each machine and a firewall to separate the lab network from your home network. I’ve