https://www.endgame.com/blog/how-get-started-ctf
Pwntools - http://pwntools.com/ Pwntools docs - https://pwntools.readthedocs.org/en/latest/about.html
https://trailofbits.github.io/ctf/index.html
https://github.com/apsdehal/awesome-ctf
http://ctfs.github.io/resources/
https://github.com/zardus/ctf-tools
Assembly - http://www.tutorialspoint.com/assembly_programming/
strings, file, UPX – Ultimate Packer for eXecutables, objdump, Strace, ExifTool, dd, John the ripper, http://crypo.bz.ms/tools/
https://github.com/ctfs/resources
Practice with solutions - http://captf.com/
Assembly crash course (32 bit) - http://docs.cs.up.ac.za/programming/asm/derick_tut/ Assebly (64 bit) - http://0xax.blogspot.in/2014/08/say-hello-to-x64-assembly-part-1.html 64 bit syscall table - http://blog.rchapman.org/post/36801038863/linux-system-call-table-for-x86-64
Buffer overflow attack - http://www.drdobbs.com/security/anatomy-of-a-stack-smashing-attack-and-h/240001832 http://www.cis.syr.edu/~wedu/Teaching/IntrCompSec/LectureNotes_New/Buffer_Overflow.pdf
Good general doc - https://www.defcon.org/images/defcon-19/dc-19-presentations/Jakhar/DEFCON-19-Jakhar-Jugaad-Linux-Thread-Injection.pdf
https://dhavalkapil.com/blogs/Buffer-Overflow-Exploit/
http://www.cis.syr.edu/~wedu/Teaching/IntrCompSec/LectureNotes_New/Buffer_Overflow.pdf
gdb for disassebly and calling secret functions - http://mohit.io/blog/gdb-assembly-language-debugging-101/
http://duartes.org/gustavo/blog/post/anatomy-of-a-program-in-memory/
IDA pro:
From:http://bbs.pediy.com/showthread.php?t=196581
Code:
6.6.141224
download: http://pan.baidu.com/s/1kTsXZiJ
access pass:jj5q
Code:
6.6.140604
download: http://pan.baidu.com/s/1mgC8NqS
access pass: b5a3
install pass: itJpyHidszaR
[or]
download: http://pan.baidu.com/s/1nt61ea9
access pass: j41g
install pass: itJpyHidszaR
Code:
6.6 sdk_utils
download: http://pan.baidu.com/s/1bn3xGqb
access pass: dlez