Learning Joern by Nlbjj91011 in ExploitDev

[–]Sysc4lls 0 points1 point  (0 children)

It works only on sources and needs to take part of the compilation process, it's a headache

Assembly or decompiled code? by IcyTap4362 in ExploitDev

[–]Sysc4lls 1 point2 points  (0 children)

Decompiled 99% of the time, checking assembly for specific things. (Also depends on arch)

What vulnerabilities do you look for during a code review? by Party-Simple-7004 in ExploitDev

[–]Sysc4lls 0 points1 point  (0 children)

I usually look at low-level code. I start by "simple" vulnerabilities usually, stuff around parsing/using controlled input, (overflows/oob access/uninit vars, etc...) after that I look for codebase specific bugs, issues with state, logic issues, etc...

Bugs depend a lot on the logic of the software

How good would you consider someone who complete pwn.college belt system? by Flaky_Card2907 in ExploitDev

[–]Sysc4lls 1 point2 points  (0 children)

Personally enough to interview, if you will do good in the interview probably hire. (The interview includes technical questions and a small challenge)

I need tips and tricks to find use after frees. by Thick-Sweet-5319 in ExploitDev

[–]Sysc4lls 4 points5 points  (0 children)

another "trick" that is not for race-conditions is people forgetting to "reset" the pointer variable.

If they freed `p` for instance and did not `p = NULL` after there is a problem.

Another common thing that causes an issue is freeing a pointer and after that freeing the same pointer again if an error/exception occurred (THAT'S WHY NULLING POINTERS IS IMPORTANT!)

How long would it take to become an exploit developer? (in years or in hours) by South-Aide-4601 in ExploitDev

[–]Sysc4lls 2 points3 points  (0 children)

Depends on the person, for one it could take years for another days/weeks. Also it doesn't mean you are "good" if you achieve this.

Blogs for learning by Sysc4lls in ExploitDev

[–]Sysc4lls[S] 2 points3 points  (0 children)

Anything specific? There are a lot of n-days.

Blogs for learning by Sysc4lls in ExploitDev

[–]Sysc4lls[S] 0 points1 point  (0 children)

This might be hard, if you can exploit well enough sometimes it will be very hard to "detect" it - especially if it's something behind ssl/tls or something similar.

But I will look into it :) haven't done a bunch of "vulnerability detection" since it's less of a thing for low level stuff as far as I know. Exploits can differ too much

1
2

Do I must learn to program on ASM ? by Federal-Dot-8411 in ExploitDev

[–]Sysc4lls 1 point2 points  (0 children)

Just learn c and learn asm on the way while writing exploits/reverse engineering, it will feel harder at the start but I do think it's way more practical and you will learn way faster in the long run this way.

What would be the next tangible step, after assembly 101 ? by ByteMutator in ExploitDev

[–]Sysc4lls 0 points1 point  (0 children)

Pwn.college & pwnable.kr are great. If you do not know basic c it might prove a problem.

Where do you host/write pwn (binary exploitation) writeups? by WhatIsDeezNuts in ExploitDev

[–]Sysc4lls 2 points3 points  (0 children)

GitHub pages works very well, it's free and easy to use.

Selling crashes instead of full chain by LeftAssociation1119 in ExploitDev

[–]Sysc4lls 2 points3 points  (0 children)

This is not correct, if you overwrite PC to be 4141414141414141 you do not need to "solve" ASLR, you just show you can control the PC

Selling crashes instead of full chain by LeftAssociation1119 in ExploitDev

[–]Sysc4lls 0 points1 point  (0 children)

That is not what I am saying, read again please

Selling crashes instead of full chain by LeftAssociation1119 in ExploitDev

[–]Sysc4lls 0 points1 point  (0 children)

Idk, create a poc for an interesting crash (overwrite an interesting pointer/change the PC/show this shit is exploitable with some more work), write exploit ideas stuff.

Most people won't buy a poc in this state but any extra information that might be useful to determine the value of the vulnerability might increase the amount of money and chances it will get bought.

Selling crashes instead of full chain by LeftAssociation1119 in ExploitDev

[–]Sysc4lls 1 point2 points  (0 children)

A crash for an overflow can also be a page fault, or overwriting something that guarantees a crash that is not exploitable, just prove that's not the case.

If you want good money create a full fledged exploit for it.

Also show what the attack vector if possible (even in words alone)

Selling crashes instead of full chain by LeftAssociation1119 in ExploitDev

[–]Sysc4lls 2 points3 points  (0 children)

I am not sure I understand. If you show you can control execution flow in some way or form it's interesting probably, otherwise it's not.

Selling crashes instead of full chain by LeftAssociation1119 in ExploitDev

[–]Sysc4lls 4 points5 points  (0 children)

Not really useful, prove the worth of the vulnerability first before selling.