- Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson
- The shellcoder''s handbook: Discovering and Exploiting Security Holes, 2nd Edition by Chris Anley
- Programming From The Ground UP
- Practical Reverse Engineering
Review of Background Material
Network: Choose ''bridge only'' mode.
Ref: Ask Ubuntu