Author Topic: How exactly does the exploit writing process work?  (Read 1567 times)

0 Members and 1 Guest are viewing this topic.

Offline ferf

  • /dev/null
  • *
  • Posts: 7
  • Cookies: -2
    • View Profile
How exactly does the exploit writing process work?
« on: December 21, 2015, 01:08:12 pm »
I've been curious about this for a while.... Say someone wants to write an exploit for skype, what would the have to do to go about writing one? Would they need to reverse engineer skype to examine code to find bugs in the code to write an exploit for? I'm not sure exactly how the whole process works, if someone could explain it to me i'd really appreciate it!

Offline kenjoe41

  • Symphorophiliac Programmer
  • Administrator
  • Baron
  • *
  • Posts: 990
  • Cookies: 224
    • View Profile
« Last Edit: December 21, 2015, 01:24:42 pm by kenjoe41 »
If you can't explain it to a 6 year old, you don't understand it yourself.
http://upload.alpha.evilzone.org/index.php?page=img&img=GwkGGneGR7Pl222zVGmNTjerkhkYNGtBuiYXkpyNv4ScOAWQu0-Y8[<NgGw/hsq]>EvbQrOrousk[/img]

Offline CRAZYBUDDY

  • /dev/null
  • *
  • Posts: 8
  • Cookies: -17
  • >>~NOT FREEDOM~~FREE CONDOM~<<
    • View Profile
Every yawn is a potential blowjob.
You just have to be fast enough.

Offline Insanity

  • EZ's Jailbait
  • Peasant
  • *
  • Posts: 51
  • Cookies: 51
  • I'm at your window right now...doing.....something
    • View Profile
    • YO PROFILE
Re: How exactly does the exploit writing process work?
« Reply #3 on: January 06, 2016, 04:36:02 am »
cant see the content

Well, that's because the Evilzone wiki is down right now,
(Well, at least I believe so, meh)
but if you really want to see how exploit development works...Google is there waiting for ya <3
"Potatoes can fly" - Ande
<V> OK. Insanity is so fine she should be on the cover of Vanity no pun intended but she takes away my Sanity. This rhymes a bit lame but no prob Caz I aint got no shame. Last thing I gotta say is insanity is that your beautiful like a dove and I hope you accept love
* Silver_Solstice has quit (Quit: Friends help you move. Real friends help you move bodies.)

Offline CRAZYBUDDY

  • /dev/null
  • *
  • Posts: 8
  • Cookies: -17
  • >>~NOT FREEDOM~~FREE CONDOM~<<
    • View Profile
Re: How exactly does the exploit writing process work?
« Reply #4 on: January 06, 2016, 06:19:41 am »
i found this tutorial helpful when im studying ..i also had that clue for a while

take a look --https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/

hope it helps
Every yawn is a potential blowjob.
You just have to be fast enough.

Offline neom

  • NULL
  • Posts: 4
  • Cookies: 0
    • View Profile
Re: How exactly does the exploit writing process work?
« Reply #5 on: January 19, 2016, 01:35:29 pm »
I strongly recommend you to read:

Metasploit, The Penetration Tester's Guide by David Kennedy et al.

Take a look at chapters 13-16
  • Building your own module
  • Creating your own exploits
  • Porting exploits to the metasploit framework
  • Meterpreter scripting

Since you're asking about exploit writing i assume you already know what Metasploit is. If not, it's an platform for building and executing exploits that you should take a look.