Similar Posts

Subscribe
Notify of
5 Answers
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Mark Berger
1 year ago

It depends on the kind of gap. On a buffer overflow you can test with fuzzers and then write an exploit of the corresponding Schellcode to a specific location to run it.

In a race condition, you need to do something more quickly than the program – for example, provide a response to a victim faster than the program itself.

Uzw.

However, if you have to ask such questions, I would recommend that you look at simpler hacking techniques beforehand. Reverse engineering of software and the development of exploit code are already quite advanced techniques.

W00dp3ckr
1 year ago

Tell you what the normal vulnerabilities are.

In C(++), there are usually string overflows.

Most modern languages do not have the problem, so many vulnerabilities in interfaces to C libraries are then.

It may also be useful to look for known gaps in large libraries.

BeamerBen
1 year ago

Can’t be answered because there are extremely many different types of vulnerabilities.

Generally, you need to know less with the programming language yourself and more with the function in which the error is stuck.

JulianHotter98
1 year ago

I just made an introduction video. Work first with the topic itself and try sites with vulnerabilities zb OWASP juice shop etc.

https://youtu.be/4SM3C5TjBls

Kwalliteht
1 year ago

Must look at the binaries.