<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Reading List on System Overlord</title><link>https://systemoverlord.com/tags/reading-list.html</link><description>Recent content in Reading List on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Fri, 26 Jun 2020 00:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/reading-list/index.xml" rel="self" type="application/rss+xml"/><item><title>Hacker Culture Reading List</title><link>https://systemoverlord.com/2020/06/26/security-culture-reading-list.html</link><pubDate>Fri, 26 Jun 2020 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2020/06/26/security-culture-reading-list.html</guid><description>&lt;p&gt;A friend recently asked me if I could recommend some reading about hacking and
security culture. I gave a couple of quick answers, but it inspired me to write
a blog post in case anyone else is looking for similar content. Unless
otherwise noted, I&amp;rsquo;ve read all of these books/resources and can recommend them.&lt;/p&gt;</description></item><item><title>Getting Started in Information Security</title><link>https://systemoverlord.com/2014/09/13/getting-started-in-information-security/</link><pubDate>Sat, 13 Sep 2014 19:30:22 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/09/13/getting-started-in-information-security/</guid><description>&lt;p&gt;I&amp;rsquo;ve only been an information security practitioner for about a year now, but I&amp;rsquo;ve been doing things on my own for years before that. However, many people are just getting into security, and I&amp;rsquo;ve recently stumbled on a number of resources for newcomers, so I thought I&amp;rsquo;d put together a short list.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://krebsonsecurity.com/2012/07/how-to-break-into-security-schneier-edition/"&gt;Brian Krebs and Bruce Schneier put together some thoughts&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://averagesecurityguy.info/2011/09/13/security-career-question/"&gt;Stephen, aka Average Security Guy has a good discussion, mostly focusing on certifications&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.slideshare.net/ChrisGrayson/so-you-want-to-be-a-hacker"&gt;Chris Grayson&amp;rsquo;s &amp;ldquo;So you want to be a hacker&amp;rdquo; presentation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.reddit.com/r/netsec/wiki/start"&gt;Reddit&amp;rsquo;s /r/netsec wiki maintains a good page on getting started&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.dc801.org/infosec-resources/"&gt;DC801&amp;rsquo;s list of InfoSec Resources&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description></item><item><title>Weekly Reading List for 5/30/14</title><link>https://systemoverlord.com/2014/05/30/weekly-reading-list-for-53014/</link><pubDate>Fri, 30 May 2014 07:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/05/30/weekly-reading-list-for-53014/</guid><description>&lt;p&gt;It&amp;rsquo;s been a busy week, so I&amp;rsquo;m just going to drop some info about Radare2.&lt;/p&gt;
&lt;h3 id="radare2-materials"&gt;Radare2 Materials&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/Maijin/radare2book"&gt;Radare2Book&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://radare.org/get/ncn2010.pdf"&gt;@pancake&amp;rsquo;s presentation on patching with r2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://canthack.org/2011/07/adventures-with-radare-1-a-simple-shellcode-analysis/"&gt;Adventures with Radare2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://radare.org/y/?p=talks"&gt;Miscellaneous Radare2 Talks&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description></item><item><title>Weekly Reading List for 5/23/14</title><link>https://systemoverlord.com/2014/05/23/weekly-reading-list-for-52314/</link><pubDate>Fri, 23 May 2014 07:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/05/23/weekly-reading-list-for-52314/</guid><description>&lt;p&gt;###Radare2 Book
Maijin on GitHub is in the process of putting together an &lt;a href="https://radare.gitbooks.io/radare2book/"&gt;online book for Radare2&lt;/a&gt;. I&amp;rsquo;ve been looking for a good resource for using Radare2, and this is a great start.&lt;/p&gt;
&lt;p&gt;###Reverse Engineering for Beginners
Dennis Yurichev has a &lt;a href="http://yurichev.com/RE-book.html"&gt;free eBook on Reverse Engineering&lt;/a&gt;. I haven&amp;rsquo;t gotten through it yet, but it looks interesting, and you can&amp;rsquo;t beat the price.&lt;/p&gt;
&lt;p&gt;###Hacker Playbook
Finally, I finished up &lt;a href="http://www.amazon.com/gp/product/1494932636/ref=as_li_tl?ie=UTF8&amp;amp;camp=1789&amp;amp;creative=390957&amp;amp;creativeASIN=1494932636&amp;amp;linkCode=as2&amp;amp;tag=systemovecom-20"&gt;The Hacker Playbook: Practical Guide To Penetration Testing&lt;/a&gt; this week. You can find &lt;a href="https://systemoverlord.com/2014/05/21/book-review-the-hacker-playbook/"&gt;my full review here&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>Reading List for 5/9/2014</title><link>https://systemoverlord.com/2014/05/09/reading-list-for-592014/</link><pubDate>Fri, 09 May 2014 07:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2014/05/09/reading-list-for-592014/</guid><description>&lt;p&gt;###On XTS Mode for Disk Encryption
Thomas Ptacek writes &lt;a href="http://sockpuppet.org/blog/2014/04/30/you-dont-want-xts/"&gt;You Don&amp;rsquo;t Want XTS&lt;/a&gt;, and suggests that though XTS works well enough in practice, it is far from ideal for Full Disk Encryption, and should not be used at all for other encryption operations (i.e., anything that doesn&amp;rsquo;t resemble FDE). XTS is useful only in that it makes &amp;ldquo;random access&amp;rdquo; encryption more secure, as you need for a disk. For encryption of whole blocks of data at rest, you probably want CBC mode, and for anything on the wire, AES-GCM is the new hotness.&lt;/p&gt;</description></item></channel></rss>