How to Setup the Environment for Exploit Writing
~As an infosec student, professional and practicer; you might have used many exploits during the pentesting process. But, have you ever tried writing an exploit by yourself, if not; then think about it. Writing an exploit needs deep understanding of the system/application and its flaws. Exploit is just like a piece of software that takes advantage of a vulnerability or flaw exists in the system. The objective of the exploit is to take control of the system.
In order to write exploits, you need to have a deep understanding of programming languages, memory management, assembly language, buffer and many other concepts of computing.
Let's start a series of tutorials that discuss the exploit writing, this videos have been created by duckademy; so here we go:
In order to write exploits, you need to have a deep understanding of programming languages, memory management, assembly language, buffer and many other concepts of computing.
Let's start a series of tutorials that discuss the exploit writing, this videos have been created by duckademy; so here we go:
0 commentaires :
Enregistrer un commentaire