Author Topic: from advisory to exploit  (Read 2827 times)

0 Members and 1 Guest are viewing this topic.

August 11, 2010, 09:54:11 am
Read 2827 times

sk3ptre

  • Newbie

  • Offline
  • *

  • 2
i read an article "from advisory to exploit", very informative.

just wondering if there are more resources like tht which explain how exactly people create exploits following advisories.

Im new in this and and i want to learn so as to be able to do the same.

guidance needed

August 13, 2010, 06:29:39 pm
Reply #1

shellc0de

  • Newbie

  • Offline
  • *

  • 4
  • Personal Text
    0x90 sled
From what I understand, a lot of fuzzing and debugging is required following the advisory to successfully develop the exploit code. The advisory at least gives the exploit developer a hint or two so he has an idea where to go when debugging. An hour or so later and he is publishing the proof of concept code to some public 0day database.

August 14, 2010, 03:43:46 am
Reply #2

MysteryFCM

  • Administrator
  • Hero Member

  • Offline
  • *****

  • 1693
  • Personal Text
    Phishing Phanatic
    • I.T. Mate
Im new in this and and i want to learn so as to be able to do the same.

We're not here to help you create exploits.
Regards

Steven Burn
I.T. Mate / hpHosts
it-mate.co.uk / hosts-file.net