Author Topic: 0 day vulnerability, how to begin?  (Read 10958 times)

0 Members and 1 Guest are viewing this topic.

Offline gh0st

  • Sir
  • ***
  • Posts: 575
  • Cookies: 8
  • #DEDSec
    • View Profile
0 day vulnerability, how to begin?
« on: May 21, 2011, 06:08:48 am »
well guys the other day I was wondering about how can person who dont even went to university or dont even studied something related to programation/security would find a 0 day vulnerability? is it hard ? if someone wish to find a 0 day how should he/she start?

Offline Tsar

  • Peasant
  • *
  • Posts: 126
  • Cookies: 10
  • turing-recognizable
    • View Profile
Re: 0 day vulnerability, how to begin?
« Reply #1 on: May 21, 2011, 09:07:45 am »
Too vague to be honest, your basically asking "how does one find an exploit that no one else has found", there are tons of different platforms and types of vulnerabilities. Basically you just need to get good and learn as much as you can.

Offline RawSocket

  • NULL
  • Posts: 2
  • Cookies: 0
    • View Profile
Re: 0 day vulnerability, how to begin?
« Reply #2 on: May 22, 2011, 04:27:26 am »

iMorg

  • Guest
Re: 0 day vulnerability, how to begin?
« Reply #3 on: May 22, 2011, 07:10:12 am »
Well university would have nothing to do with exploitation. Most hackers learned to program and most things they know about computers when they were too young to even be in high school.

Without programming knowledge you are pretty much dead in the water. You cant possibly know how to find a hole in something you dont understand and even if you did how would you go about executing it without knowing how to write something to take advantage of it.

To start finding a 0-Day I would suggest looking at what API and libraries were used to write the target application/system. If the software is closed source you are going to need to have good knowledge in assembly and familiarity with the operating system that it runs on. If the software is open source then all you need is a copy of the source and a text editor.

You should try to emulate the targets operating environment as close as possible when testing an exploit you find.

Offline Stackprotector

  • Administrator
  • Titan
  • *
  • Posts: 2515
  • Cookies: 205
    • View Profile
Re: 0 day vulnerability, how to begin?
« Reply #4 on: May 23, 2011, 12:57:08 am »
http://www.securitytube.net/groups?operation=view&groupId=5 ,
And continue on the other series, at the end you will know how to find 0day and other vurns.
~Factionwars

Offline noob

  • Knight
  • **
  • Posts: 202
  • Cookies: 29
    • View Profile
Re: 0 day vulnerability, how to begin?
« Reply #5 on: May 24, 2011, 01:23:31 am »
Code: [Select]
http://www.exploit-db.com/papers/?page=16
Exploit Writing Tutorial Part 1 - Stack Based Overflows
Exploit Code Downloads      Exploit Writing Tutorial Part 2 - Jump to Shellcode    
Exploit Code Downloads      Exploit Writing Tutorial Part 3 - SEH    
Exploit Code Downloads      Exploit Writing Tutorial Part 3b - SEH Based
Exploit Code Downloads      Exploit Writing Tutorial Part 4 - From Exploit to Metasploit the Basics
Exploit Code Downloads      Exploit Writing Tutorial Part 5 - Debugger Modules in Exploit Development
Exploit Code Downloads      Exploit Writing Tutorial Part 6 - Bypassing Stack Cookies, SAFESEH, Hardware DEP and ASLR
Exploit Code Downloads      Exploit Writing Tutorial Part 7 - Unicode, from 0x00410041 to Calc

Offline gh0st

  • Sir
  • ***
  • Posts: 575
  • Cookies: 8
  • #DEDSec
    • View Profile
Re: 0 day vulnerability, how to begin?
« Reply #6 on: May 24, 2011, 08:26:51 am »
@noob: +1 for  that

Offline I_Learning_I

  • Knight
  • **
  • Posts: 267
  • Cookies: 26
  • Nor black or white, not even grey. What hat am I?
    • View Profile
    • Hacking F0r Fr33
Re: 0 day vulnerability, how to begin?
« Reply #7 on: May 24, 2011, 11:06:45 am »
Too vague to be honest, your basically asking "how does one find an exploit that no one else has found", there are tons of different platforms and types of vulnerabilities. Basically you just need to get good and learn as much as you can.

Well finding 0Days isn't exactly hard, however someone that has no idea of what his doing wouldn't even consider it an 0Day, therefore being just another unknown bug.
0Days are always a flaw in the programming of the source, could be a function, the language itself, or just the way the coder used the function or coded is tool.
With that being said all you need to find an 0Day it's either focus on something you want to exploit and look at it's  source-code (if it's available) and try to find a vulnerability, or simply fuzz it.
Fuzzing it's (in a basic way) just doing a bruteforce of input and parameter to your target and trying to find something, either a segmentation fault, memory access, anything.

Answering the question how to begin.
First off you should see what kind of 0Day you want and what do you consider an 0Day, some people consider SQLi on a website an 0Day because no one else had found it, others consider only Overflows and Format String Attacks and others consider only new findings as 0Day, like Slowloris when it came out (although it used the SYN Flood technique).
Anyhow from there you'll need to study your target (the language and it's source) for instance, PHP it's an interpreter, so if you can't find a vulnerability that would exploit the website, perhaps you can find something that exploits the interpreter itself, and those are different matters. Exploiting PHP requires PHP knowledge, exploiting the interpreter requires ASM knowledge.

Just like Tsar said , you're being to vague, because you can exploit a program, a library, an API, the language itself, protocols, and it's a very different approach in some cases.
To exploit a program all you need is to fuzz it, send lot of random parameters, until you find some vulnerability that allows you to get a shell.
When exploiting protocols your objective might not be to get a shell but for instance to make a server inaccessible and for that you need to look to the source code and find uncovered options.
Thanks for reading,
I_Learning_I

Offline gh0st

  • Sir
  • ***
  • Posts: 575
  • Cookies: 8
  • #DEDSec
    • View Profile
Re: 0 day vulnerability, how to begin?
« Reply #8 on: June 03, 2011, 05:00:07 am »
well just wanted to post this seems useful talks about remote code execution exploit over Windows XP 0 ring that thingy named 0 ring its just a thingy which is part of the architecture of the OS nothing too hard to underestand but there are a lot of more technical details too
http://www.eeye.com/eEyeDigitalSecurity/media/ResearchPapers/StepIntoTheRing.pdf?ext=.pdf

and more in: http://www.eeye.com/Resources/Security-Center/Research/Papers
« Last Edit: June 03, 2011, 05:00:27 am by gh0st »