How to Setup the Environment for Exploit Writing

As an infosec student, professional and practicer; you might have used many exploits during the pentesting process. But, have you ever tried writing an exploit by yourself, if not; then think about it. Writing an exploit needs deep understanding of the system/application and its flaws. Exploit is just like a piece of software that takes advantage of a vulnerability or flaw exists in the system. The objective of the exploit is to take control of the system.

In order to write exploits, you need to have a deep understanding of programming languages, memory management, assembly language, buffer and many other concepts of computing.

Let’s start a series of tutorials that discuss the exploit writing, this videos have been created by duckademy; so here we go:


  

Irfan Shakeel
Irfan Shakeel, the founder of ehacking project, he also hosts cyber security training classes at EH Academy. He has discovered many vulnerabilities in the famous platforms (like Google, Dailymotion, Harvard University & etc.). He specializes in Network hacking, VoIP pentesting & digital forensics. He is the author of the book title “Hacking from Scratch”.

Most Popular

The Complete OSINT Tutorial to Find Personal Information About Anyone

This article mainly focuses on how to discover a person's digital footprint and gather personal data by using open-source intelligence (OSINT). So, in its...

How to find the password of hacked email addresses using OSINT

Open-source intelligence or OSINT is a potent technique, and it can give a lot of valuable information, if implemented correctly with the right strategy...

How to Identify Company’s Hacked Email Addresses Using Maltego & HaveIbeenPawned

This article is part of the Maltego OSINT tutorial, where you will learn to identify the already hacked account, and it’s password using the...

5 Key Vulnerabilities in Global Payroll

The cyber threat against payroll is growing in sophistication and frequency, according to the latest FBI cybercrime report. Many of these attacks exploit fixable...