TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: How automated is exploit-generation these days?

1 pointsby lopsidedBrainover 4 years ago
I religiously apply patches to all my personal machines as soon as they become available. But I&#x27;ve recently been wondering about how much of a difference it makes today. I used to follow this space fairly closely 4-5 years ago, but I don&#x27;t know what has changed since then.<p>Once a typical use-after-free vulnerability is disclosed publicly, for example, how quickly does it get weaponized? I remember reading some academic papers a while back, which claimed to be able to automatically generate exploits from a patch. I believe ROP compilers exist also that will take some logic and string it together with a given set of gadgets in a binary. What is the current state of all that tooling?<p>Bottomline: Are there stats (e.g. from honeypots) that tell us the likelihood of a typical laptop&#x2F;mobile user being compromised based on a given security flaw, given the amount of time they run unpatched after disclosure?<p>I figured there must be experts here who have been keeping up with all of this better than I have. I&#x27;d love to hear from you all!

1 comment

kdbgover 4 years ago
Are there stats, not that I&#x27;m aware of. There might be its just not my area. I am more aware on the exploit development side of things though.<p>The process of going from a bug to a weaponized exploit though is still largely manual. Yes some tooling exists that may automate certain tasks, however these tools often only work as proof of concepts. ROP compilers are a great example, they &quot;work&quot; but they are are usually far more prone to crashing than one compiled by hand, as such wouldn&#x27;t be used in the real world.<p>Thats just kinda the general truth, ignoring the many cases where the automated offering just don&#x27;t work at all, when they do its often not weaponized to a useful degree. You might thing that you could then use what it does as a starting place, but it takes a lot of time to now reverse what the script did and figure out what can&#x2F;should be changed, similar to having just done it yourself in the first place and not being constrained.<p>That said there has been some research in augmenting the workflow by discovering exploit strategy candidates. I forget the name right now, but there was a paper early this year presenting a capability guided fuzzer that focused on &quot;fuzzing&quot; OOB Write vulns to expand them and discover viable exploit strategies for them.