Malware Domain List
Malware Related => Malware Analysis => Topic started by: sk3ptre on August 11, 2010, 09:54:11 am
-
i read an article "from advisory to exploit", very informative.
just wondering if there are more resources like tht which explain how exactly people create exploits following advisories.
Im new in this and and i want to learn so as to be able to do the same.
guidance needed
-
From what I understand, a lot of fuzzing and debugging is required following the advisory to successfully develop the exploit code. The advisory at least gives the exploit developer a hint or two so he has an idea where to go when debugging. An hour or so later and he is publishing the proof of concept code to some public 0day database.
-
Im new in this and and i want to learn so as to be able to do the same.
We're not here to help you create exploits.