[#]bsidescbr2024 starting with Chompie presenting the keynote on the exploit development lifecycle #cybersecurity
=> More informations about this toot | More toots from merospit@infosec.exchange
Exploitability of vulnerabilities is a cost benefit calculation because you can't work on a difficult bug forever.
[#]bsidescbr2024
=> More informations about this toot | More toots from merospit@infosec.exchange
Vulnerabilities can change the program state to a "weird machine", which is a Turing machine that doesn't necessarily follow the possibilities of the original state machine.
[#]bsidescbr2024
=> More informations about this toot | More toots from merospit@infosec.exchange
Logic bugs are more stable than memory corruption, which is important when the goal is to create a reliable exploit.
[#]bsidescbr2024
=> More informations about this toot | More toots from merospit@infosec.exchange
More useful for exploits to target specific versions because there are many possible differences between versions that can increase the complexity of the exploit and hence the time and cost of development.
[#]bsidescbr2024
=> More informations about this toot | More toots from merospit@infosec.exchange
Understanding the target environment is important to improve reliability. For example, just having other things running on targets can change behaviour of some vulnerabilities compared to a quiet development lab.
[#]bsidescbr2024
=> More informations about this toot | More toots from merospit@infosec.exchange
Reducing the novelty of an expolit can make attribution more difficult, at the potential cost of being detected easier.
[#]bsidescbr2024
=> More informations about this toot | More toots from merospit@infosec.exchange
Advanced exploit development techniques are useful for red team consultants to emulate highly resourced adversaries. For most people, a proof of concept to demonstrate a vulnerability is enough.
[#]bsidescbr2024
=> More informations about this toot | More toots from merospit@infosec.exchange This content has been proxied by September (ba2dc).Proxy Information
text/gemini