EvilZone

Hacking and Security => Beginner's Corner => : ferf December 21, 2015, 01:08:12 PM

: How exactly does the exploit writing process work?
: ferf December 21, 2015, 01:08:12 PM
I've been curious about this for a while.... Say someone wants to write an exploit for skype, what would the have to do to go about writing one? Would they need to reverse engineer skype to examine code to find bugs in the code to write an exploit for? I'm not sure exactly how the whole process works, if someone could explain it to me i'd really appreciate it!
: Re: How exactly does the exploit writing process work?
: kenjoe41 December 21, 2015, 01:24:08 PM
https://evilzone.org/wiki//index.php/The_big_tutorial_index#Exploit_Development (https://evilzone.org/wiki//index.php/The_big_tutorial_index#Exploit_Development)
: Re: How exactly does the exploit writing process work?
: CRAZYBUDDY January 05, 2016, 04:50:03 PM
https://evilzone.org/wiki//index.php/The_big_tutorial_index#Exploit_Development (https://evilzone.org/wiki//index.php/The_big_tutorial_index#Exploit_Development)

cant see the content
: Re: How exactly does the exploit writing process work?
: Insanity January 06, 2016, 04:36:02 AM
cant see the content

Well, that's because the Evilzone wiki is down right now,
(Well, at least I believe so, meh)
but if you really want to see how exploit development works...Google is there waiting for ya <3
: Re: How exactly does the exploit writing process work?
: CRAZYBUDDY January 06, 2016, 06:19:41 AM
i found this tutorial helpful when im studying ..i also had that clue for a while

take a look --https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/

hope it helps
: Re: How exactly does the exploit writing process work?
: neom January 19, 2016, 01:35:29 PM
I strongly recommend you to read:

Metasploit, The Penetration Tester's Guide by David Kennedy et al.

Take a look at chapters 13-16

Since you're asking about exploit writing i assume you already know what Metasploit is. If not, it's an platform for building and executing exploits that you should take a look.