I would like to welcome everyone to my "kitchen". I will be posting anything related to security research and my own studies, with a focus on exploit development.
There are plenty of great resources and blogs out there today on exploit development. I do not aim to rewrite anything that is available on the subject, but to provide examples of exploiting more current software vulnerabilities by reading advisories. I do this in the hopes that it will help readers understand exploit methods easier by seeing real world examples. It certainly would of helped me when I started out.
No comments:
Post a Comment