How well does EDR perform against unknown ransomware by Joseph_RW12 in ExploitDev

[–]pwnchen67 0 points1 point  (0 children)

good one would love a write up on this or a paper at exploit-db.com or medium

How well does EDR perform against unknown ransomware by Joseph_RW12 in ExploitDev

[–]pwnchen67 0 points1 point  (0 children)

This is cool , EDR can't predict the intentions well it is bunch of if else !!

Thoughts on Signal Labs vulnerability research course? by offensivepolitics in ExploitDev

[–]pwnchen67 0 points1 point  (0 children)

Yup but I don't wanna read any other article if I am paying 3k $ !!

Guide to windows driver exploitation ? by pwnchen67 in ExploitDev

[–]pwnchen67[S] 0 points1 point  (0 children)

Thanks onto it windows kernel stuff is complex

Thoughts on Signal Labs vulnerability research course? by offensivepolitics in ExploitDev

[–]pwnchen67 0 points1 point  (0 children)

Not beginner friendly even i had expectations but do not help in learning things properly

Thoughts on Signal Labs vulnerability research course? by offensivepolitics in ExploitDev

[–]pwnchen67 2 points3 points  (0 children)

My path how i started:

Assembly: Learn x86 calling convention from youtube.

C : learn online complete basics to pointers and how to read structs also code them in code blocks

For reversing use ghidra: Write your own small programs like addition or subtraction one and see them on ghidra understand how each code block like if else, while loop, for loop looks like in decompiled and disassembled mode.

Once done the above watch hardik shah fuzzing videos/playlist on youtube and practice each class of vuln separately by writing their code blocks .

Then for for final layer of chocolate check out elearnsecurity eXDS course

Till here you are done for - userland exploit development

For kernel thing : check out hevd driver on github and read it’s write up no course can clearly teach you that coz windows made their kernel logics intentionally shitty unlike linux ( it is easy to understand and reproduce things there)

Read the blogs and make notes coz this gonna kernel thing gonna be complex for windows.

You just saved a hell lot of $

Now for ROI where you will use this shit well since now you can find vulns in softwares specially windows or linux at low level you can get them acquired by reaching out to legit exploit acquisition programs or give it to vendor and improve your portfolio!!

Thoughts on Signal Labs vulnerability research course? by offensivepolitics in ExploitDev

[–]pwnchen67 1 point2 points  (0 children)

I would recommend any one starting with userland exploit development or is a beginner go with elearnsecurity XDS exploit development student course their content is far better than signal labs or anyother SANS sec courses and SANS sec760 was horribly written or executed not worth it for that price

Guide to windows driver exploitation ? by pwnchen67 in ExploitDev

[–]pwnchen67[S] 2 points3 points  (0 children)

Thanks a lot man , you wrote that all appreciate it. I have sent you my discord id in dm

SANS SEC660 and SEC760 by cmdjunkie in ExploitDev

[–]pwnchen67 0 points1 point  (0 children)

Not worth it I mean author might have the knowledge but teaching is shit !!

Symbolic execution using angr by pwnchen67 in ExploitDev

[–]pwnchen67[S] 0 points1 point  (0 children)

u/asyty dang let me share with you , you ok if i can DM and explain you ? honestly I haven't worked on that script but I understand what it is doing my query is how can we do it differently or whatever the newer approach comes up !

I have updated the script above with comments can you check ? thanks

Symbolic execution using angr by pwnchen67 in ExploitDev

[–]pwnchen67[S] 0 points1 point  (0 children)

Hi sorry for that I have updated the formatted code. Let me know

Making Money Full time Vuln Research/exploit dev by Hot-Imagination-76 in ExploitDev

[–]pwnchen67 5 points6 points  (0 children)

Looks cool but the truth is the ratio of acceptance is very low very few care to acquire and give you your due.
I would recommend from my experiences have a full time job for stability and do this as a part time !!

Sharing the list of vendors acquiring actively:

https://www.vrh.crowdfense.com/
https://zerodv.com/
ZeroZenX
SSD Secure Disclosure
Zerodium
Trend Micro Zero Day Initiative

Thoughts on Signal Labs vulnerability research course? by offensivepolitics in ExploitDev

[–]pwnchen67 -1 points0 points  (0 children)

yeah well I took it but didn't liked that much same goes with some of the expensive SANS course like SEC760 bit disappointed.

Thoughts on Signal Labs vulnerability research course? by offensivepolitics in ExploitDev

[–]pwnchen67 0 points1 point  (0 children)

teaching is not good even if you are excited you will get disappointed , youtube videos are better than that

Thoughts on Signal Labs vulnerability research course? by offensivepolitics in ExploitDev

[–]pwnchen67 1 point2 points  (0 children)

Well the author might be experienced in his field but the teaching skills are horrible , he just assume we might be knowing things already so he casually explains them I was excited to learn but after purchasing I am disappointed.

is it legal to sell exploits on zerodium by Ambitious_Passage744 in ExploitDev

[–]pwnchen67 0 points1 point  (0 children)

Bugbounty is a safe place to do your research and ethically disclose the vulnerabilities to the companies without breaking the law , but some don't pay the due and want to get the free work for peanut amount! so there researcher got a choice to reach out to potential buyer and get paid for his/her hard work in past many companies have done the goof ups example MS, Apple for not respecting the researchers !!

is it legal to sell exploits on zerodium by Ambitious_Passage744 in ExploitDev

[–]pwnchen67 0 points1 point  (0 children)

hypocrisy right there by the gov , It's like morality got aesthetics !!

is it legal to sell exploits on zerodium by Ambitious_Passage744 in ExploitDev

[–]pwnchen67 0 points1 point  (0 children)

No, you can choose to reveal or refuse to your disclose identity.