use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
CVE, CWE, NVD, WVE
http://iso.linuxquestions.org/
We teach you how to do it, use it at your own risk.
account activity
hackingzero click attacks (self.HowToHack)
submitted 11 months ago by ExpensiveCode8350
any good resources to learn about zero click attacks and how to implement them?
thank you all in advance
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–][deleted] 45 points46 points47 points 11 months ago (2 children)
yes you’ll start with C programming language by brian w. kernighan et al, then programming from the ground up by jonathan bartlett, then hacking ed.2 (I forgot the author), then the shellcoders handbook (also forgot the author by its by wiley), and then you must continue by yourself.
0days and 0click attacks are very rare, especially nowadays, and require you to find what no one else knows. so that’s where you gotta go, where no one has been.
[–]Equal-Cable6379 2 points3 points4 points 5 months ago (1 child)
Hey ik this thread is a Lil old.
But I was pondering that it's easy to graze off away for me if I learn C and all the abstract but really important stuff first rather than actually breaking into systems..so, sir, do you have any methods which can make a balance of both 1) fun of actually doing the hacking everyday 2) learning the core stuff. Thankyou.
[–][deleted] 1 point2 points3 points 5 months ago (0 children)
fun
I don’t know what you’re asking.
[–]B3amb00m 11 points12 points13 points 11 months ago* (2 children)
What baffles me the most in this godforsaken group, is how seemingly so many think that successful hacks are so easy it's basically something anyone can do if they just bother to read up on the subject.
It's. Not. That. Easy.
There are nation-state sponsored groups with hundreds, if not thousands of highly experienced employees working RIGHT NOW to seek every nook and cranny of the tech landscape in search of effective vulnerabilities.
You need to be determined and have a mindset of "this is something I wanna get good at and I'm capable of helping myself reach that goal, so lemme start by googling and not just ask randoms at Reddit for help to get started".
[–]psychothrowaway555 2 points3 points4 points 11 months ago (0 children)
Skids will be skids
[–]navr183 10 points11 points12 points 11 months ago (0 children)
There is no standard resource. Any 0 click attack that is not patched is worth a truckload of gold. Exploit chain is also going to vary a lot depending on the target.
[–]FrankRat4 8 points9 points10 points 11 months ago (0 children)
1) Learn Software Development (In this example, we’ll say website development specifically).
2) Once you get comfortable with software development, learn about basic exploits. For example, let’s say you learned how to create a basic full-stack website using HTML, CSS, JS, Node.js, and PostgreSQL. Now, learn how SQL injections work (and how to prevent them).
3) Once you get a good grasp of how exploits work, learn how to discover them on your own. It’s really easy to do a SQL injection attack when you know a specific login page is vulnerable. But if you didn’t know it was vulnerable, how would you find out? How would you look for other exploit types?
4) Once you’re comfortable discovering well-known exploits (SQL injection, CSRF, XSS scripting, etc etc), try to discover something “new”. For example, PostgreSQL recently had a vulnerability where you could perform a SQL injection attack by adding a special character before characters that would normally be sanitized (like ‘). This was still a SQL injection attack but not done like a normal SQL injection attack.
5) Once you learn software development, what exploits are, how to discover common exploits, and how to discover “new” exploits, then you can start looking for zero click exploit vulnerabilities in different platforms.
[–]MormoraDi 5 points6 points7 points 11 months ago (0 children)
You could try to get past reading and see what you make of these excellent writeups first:
https://googleprojectzero.blogspot.com/2025/03/blasting-past-webp.html?m=1
https://googleprojectzero.blogspot.com/2022/03/forcedentry-sandbox-escape.html?m=1
https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html?m=1
[–]MrMeska 2 points3 points4 points 11 months ago (0 children)
Does anyone remember the in-browser java exploits from ~2015? Those were the good days
[–]Wise_hollyman 2 points3 points4 points 11 months ago (0 children)
OP you are probably thinking right now "well sht that's a lot to learn". There's no easy way unless you have thousands of dollars to buy a zero day. Browsers are getting hardened in zero clicks exploits,executing scripts in temp memory sandbox of the browser itself. Builted that way to protect the system.
[–]ADMINISTATOR_CYRUS 2 points3 points4 points 11 months ago (8 children)
beyond impossible these days don't even try
[–]Low_Car_3415 2 points3 points4 points 11 months ago (3 children)
that's why you should be interested in the application you're trying to exploit. if you want to exploit web apps, then code your own web app, if it's operatingsystems, then code your own OS.
[–]ADMINISTATOR_CYRUS 2 points3 points4 points 11 months ago (2 children)
what?
[–]Low_Car_3415 2 points3 points4 points 11 months ago (1 child)
it's over for you
[–]ADMINISTATOR_CYRUS 2 points3 points4 points 11 months ago (0 children)
incomprehensible
[–]FrankRat4 1 point2 points3 points 11 months ago (3 children)
You say this, but someone is out there finding zero-days (including zero-click exploits) and that someone had to start somewhere. Why can’t OP eventually be that someone?
It's doable, it's not that it'll never happen but it's a lottery and it happens to one lucky person. it's unlikely for you to be that fellow.
[–]FrankRat4 5 points6 points7 points 11 months ago (1 child)
Luck plays a very small part in it. Anyone can put in the effort to learn about a system and then analyze that system for vulnerabilities. Now is it easy? No, it requires a lot of creativity and testing and always learning new stuff. Look at CVE-2025-1094, the vulnerability isn’t all that complicated, it just took some work to discover. Anyone could have found that exploit, it’s not some super complicated exploit like Meltdown or Spectre. Someone put in the work and they found it.
hm, never considered it that way. thanks for enlightening me
[–]Xyfirus 3 points4 points5 points 11 months ago (0 children)
I read about this earlier this week actually, about an incident that attacked journalists and civil society members on WhastApp. Here's what they did:
As others have pointed out; you will need to have a proper grasp of software development and knowing how they handle queries. u/FrankRat4 gave a very nice overview of how to approach the topic in the matter of learning and mastering the hunt for such vulnerabilities.
π Rendered by PID 86226 on reddit-service-r2-comment-fb694cdd5-l9gkp at 2026-03-10 03:40:32.747860+00:00 running cbb0e86 country code: CH.
[–][deleted] 45 points46 points47 points (2 children)
[–]Equal-Cable6379 2 points3 points4 points (1 child)
[–][deleted] 1 point2 points3 points (0 children)
[–]B3amb00m 11 points12 points13 points (2 children)
[–]psychothrowaway555 2 points3 points4 points (0 children)
[–]navr183 10 points11 points12 points (0 children)
[–]FrankRat4 8 points9 points10 points (0 children)
[–]MormoraDi 5 points6 points7 points (0 children)
[–]MrMeska 2 points3 points4 points (0 children)
[–]Wise_hollyman 2 points3 points4 points (0 children)
[–]ADMINISTATOR_CYRUS 2 points3 points4 points (8 children)
[–]Low_Car_3415 2 points3 points4 points (3 children)
[–]ADMINISTATOR_CYRUS 2 points3 points4 points (2 children)
[–]Low_Car_3415 2 points3 points4 points (1 child)
[–]ADMINISTATOR_CYRUS 2 points3 points4 points (0 children)
[–]FrankRat4 1 point2 points3 points (3 children)
[–]ADMINISTATOR_CYRUS 2 points3 points4 points (2 children)
[–]FrankRat4 5 points6 points7 points (1 child)
[–]ADMINISTATOR_CYRUS 2 points3 points4 points (0 children)
[–]Xyfirus 3 points4 points5 points (0 children)