I'm trying to get into offsec atm, just for fun. I have an agreement with a friend of mine that I can try to hack his computer as much as I like, because he's curious to see if I can actually do it, but I'd like to do it properly, not as a skid, and I'd like to take advantage of this opportunity to let loose with getting my hands dirty, learning to program properly. (So no Metasploit or Kali Linux bull).
I know bash and a little awk - which means in theory I know some Perl (if I study the manual for an hour or two) - but after studying up a little on the Emacs Lisp info files...I fell in love with the syntax. It's too perfect. It's so clean, so simple - so elegant! But there aren't a lot of resources out there for using emacs lisp in an offsec context. I have The Art of Exploitation by Jon Erickson (but idk why everyone recommends it. Is there a 3rd edition? This one is FULL of typos. Maybe it's a litmus test by the community at large, but it can be frustrating trying to learn when the code explanations have typos in what variables they're referring to sometimes) and Black Hat Rust, so logically, first steps would seem to be to read those, understand C and Rust, then apply their principles in Perl or Emacs Lisp as a test of my understanding, but that's going to take a while and would kind of be a waste of the C and Rust knowledge I'd accumulate, so I'm wondering, how would some of you go about using Perl or Emacs Lisp to maybe infect files you put on a thumb drive or bypass AV on a Windows 10/11 machine, using compiled bytecode?
Any snippets of code examples come to mind? Don't give me enough that I can copy from you. Preferably I'd like this thread to be a space for creative discussion and theory posting about this really. Let's trade ideas :D
I think scsh might be a better choice than elisp. It has built-in regular expressions, and can make system calls. A popular, more unixy choice among lispers is tcl. Perl is nice read Higher Order Perl, that's required reading. Unless you're reading sicp obvs.
Also you need to make your bootcodes with native code, unless you can include the vm with the bytecode.
What is 'offsec´?
office security :^)
>>5 jeff
you should get into offing yourself
lets see the cyanide molecule is made of carbon and nitrogen
burning coal is one method carbon poisoning
eating apricot kernels is another but you will likely vomit it
lmao I love this board