How to Setup the Environment for Exploit Writing

As an infosec student, professional and practicer; you might have used many exploits during the pentesting process. But, have you ever tried writing an exploit by yourself, if not; then think about it. Writing an exploit needs deep understanding of the system/application and its flaws. Exploit is just like a piece of software that takes advantage of a vulnerability or flaw exists in the system. The objective of the exploit is to take control of the system.

In order to write exploits, you need to have a deep understanding of programming languages, memory management, assembly language, buffer and many other concepts of computing.

Let’s start a series of tutorials that discuss the exploit writing, this videos have been created by duckademy; so here we go:


Irfan Shakeel
Irfan Shakeel, the founder of ehacking project, he also hosts cyber security training classes at EH Academy. He has discovered many vulnerabilities in the famous platforms (like Google, Dailymotion, Harvard University & etc.). He specializes in Network hacking, VoIP pentesting & digital forensics. He is the author of the book title “Hacking from Scratch”.

Most Popular

Blind SQL Injection Tutorial to Hack a Website

In the previous article, we have the basics of SQL Injection; what SQLi is and what are the types of SQL injection. And, In...

What is SQL Injection? Tutorial: Type and Example

What is SQL injection, and what are the types of SQL injection? These are the common questions, and we will seek the answer to...

Are Cisco 300-410 Exam and Its Related Certification Your Pathway to Career Success? Find Out about This

Introduction Career success can mean different things to different people. For some, it could mean having a prestigious title and for others, it could be...

How to Hack Windows 10 Password Using FakeLogonScreen in Kali Linux

This article demonstrates an in-depth guide on how to hack Windows 10 Passwords using FakeLogonScreen. Hacking Windows 10 password is an exciting topic and...