Malware Domain List

Malware Related => Malware Analysis => Topic started by: sk3ptre on August 11, 2010, 09:54:11 am

Title: from advisory to exploit
Post by: sk3ptre on August 11, 2010, 09:54:11 am
i read an article "from advisory to exploit", very informative.

just wondering if there are more resources like tht which explain how exactly people create exploits following advisories.

Im new in this and and i want to learn so as to be able to do the same.

guidance needed
Title: Re: from advisory to exploit
Post by: shellc0de on August 13, 2010, 06:29:39 pm
From what I understand, a lot of fuzzing and debugging is required following the advisory to successfully develop the exploit code. The advisory at least gives the exploit developer a hint or two so he has an idea where to go when debugging. An hour or so later and he is publishing the proof of concept code to some public 0day database.
Title: Re: from advisory to exploit
Post by: MysteryFCM on August 14, 2010, 03:43:46 am
Im new in this and and i want to learn so as to be able to do the same.

We're not here to help you create exploits.