Hey Folks,
I have a couple pretty simple questions regarding exploitation and a lot of the vulnerabilities in the wild today. Basically, when you read about these new vulnerabilities (CVE XYY) etc, there is always something I'm curious about. I'm not being platform specific here, but let's say there was a bug found in OpenSSH, in this case a buffer overflow that granted root privileges, which someone would then write an exploit to carry out.
* What usually makes a person target a specific service / daemon/ platform ? Their specialty ? Maybe their experience, preference ?
* I know this is the noob thread, so with that said I have a bit less trepidation to ask here, but how long in the grand scheme of things did a lot of you practice this craft before really delving deep into exploitation ?
* I read that a zero day can sometimes go for $250,000.
* maybe this one is common sense, but I notice that a lot of exploits that are fairly new are not released that quickly on any bug tracking websites. Skiddy prevention ?
At this point so far, I have an absolute blast with Python, a little bit of Java now, and some HTML, CSS stuff for my web server.
My goal is to be a pen-tester someday, so I'm trying to slowly but surely learn what goes on under the hood with a lot of different attacks both in the wild and in the past.
Not expecting to be spoon fed here by the way. I appreciate any input.