EvilZone

Hacking and Security => Beginner's Corner => Topic started by: ferf on December 21, 2015, 01:08:12 PM

Title: How exactly does the exploit writing process work?
Post by: ferf on December 21, 2015, 01:08:12 PM
I've been curious about this for a while.... Say someone wants to write an exploit for skype, what would the have to do to go about writing one? Would they need to reverse engineer skype to examine code to find bugs in the code to write an exploit for? I'm not sure exactly how the whole process works, if someone could explain it to me i'd really appreciate it!
Title: Re: How exactly does the exploit writing process work?
Post by: kenjoe41 on December 21, 2015, 01:24:08 PM
https://evilzone.org/wiki//index.php/The_big_tutorial_index#Exploit_Development (https://evilzone.org/wiki//index.php/The_big_tutorial_index#Exploit_Development)
Title: Re: How exactly does the exploit writing process work?
Post by: CRAZYBUDDY on January 05, 2016, 04:50:03 PM
https://evilzone.org/wiki//index.php/The_big_tutorial_index#Exploit_Development (https://evilzone.org/wiki//index.php/The_big_tutorial_index#Exploit_Development)

cant see the content
Title: Re: How exactly does the exploit writing process work?
Post by: Insanity on January 06, 2016, 04:36:02 AM
cant see the content

Well, that's because the Evilzone wiki is down right now,
(Well, at least I believe so, meh)
but if you really want to see how exploit development works...Google is there waiting for ya <3
Title: Re: How exactly does the exploit writing process work?
Post by: CRAZYBUDDY on January 06, 2016, 06:19:41 AM
i found this tutorial helpful when im studying ..i also had that clue for a while

take a look --https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/

hope it helps
Title: Re: How exactly does the exploit writing process work?
Post by: neom on January 19, 2016, 01:35:29 PM
I strongly recommend you to read:

Metasploit, The Penetration Tester's Guide by David Kennedy et al.

Take a look at chapters 13-16

Since you're asking about exploit writing i assume you already know what Metasploit is. If not, it's an platform for building and executing exploits that you should take a look.