I'm trying to get into offsec atm, just for fun. I have an agreement with a friend of mine that I can try to hack his computer as much as I like, because he's curious to see if I can actually do it, but I'd like to do it properly, not as a skid, and I'd like to take advantage of this opportunity to let loose with getting my hands dirty, learning to program properly. (So no Metasploit or Kali Linux bull).
I know bash and a little awk - which means in theory I know some Perl (if I study the manual for an hour or two) - but after studying up a little on the Emacs Lisp info files...I fell in love with the syntax. It's too perfect. It's so clean, so simple - so elegant! But there aren't a lot of resources out there for using emacs lisp in an offsec context. I have The Art of Exploitation by Jon Erickson (but idk why everyone recommends it. Is there a 3rd edition? This one is FULL of typos. Maybe it's a litmus test by the community at large, but it can be frustrating trying to learn when the code explanations have typos in what variables they're referring to sometimes) and Black Hat Rust, so logically, first steps would seem to be to read those, understand C and Rust, then apply their principles in Perl or Emacs Lisp as a test of my understanding, but that's going to take a while and would kind of be a waste of the C and Rust knowledge I'd accumulate, so I'm wondering, how would some of you go about using Perl or Emacs Lisp to maybe infect files you put on a thumb drive or bypass AV on a Windows 10/11 machine, using compiled bytecode?
Any snippets of code examples come to mind? Don't give me enough that I can copy from you. Preferably I'd like this thread to be a space for creative discussion and theory posting about this really. Let's trade ideas :D