EvilZone
Hacking and Security => Beginner's Corner => : ferf December 21, 2015, 01:08:12 PM
-
I've been curious about this for a while.... Say someone wants to write an exploit for skype, what would the have to do to go about writing one? Would they need to reverse engineer skype to examine code to find bugs in the code to write an exploit for? I'm not sure exactly how the whole process works, if someone could explain it to me i'd really appreciate it!
-
https://evilzone.org/wiki//index.php/The_big_tutorial_index#Exploit_Development (https://evilzone.org/wiki//index.php/The_big_tutorial_index#Exploit_Development)
-
https://evilzone.org/wiki//index.php/The_big_tutorial_index#Exploit_Development (https://evilzone.org/wiki//index.php/The_big_tutorial_index#Exploit_Development)
cant see the content
-
cant see the content
Well, that's because the Evilzone wiki is down right now,
(Well, at least I believe so, meh)
but if you really want to see how exploit development works...Google is there waiting for ya <3
-
i found this tutorial helpful when im studying ..i also had that clue for a while
take a look --https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/
hope it helps
-
I strongly recommend you to read:
Metasploit, The Penetration Tester's Guide by David Kennedy et al.
Take a look at chapters 13-16
- Building your own module
- Creating your own exploits
- Porting exploits to the metasploit framework
- Meterpreter scripting
Since you're asking about exploit writing i assume you already know what Metasploit is. If not, it's an platform for building and executing exploits that you should take a look.