TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

What is a “good” memory corruption vulnerability?

81 pointsby scarybeastalmost 10 years ago

3 comments

tptacekalmost 10 years ago
Especially if you're not already "read in" how how modern exploits are designed, this is a really, really excellent blog post.
tacomanalmost 10 years ago
Reading vulnerability and exploit analysis is (and always will be) a hobby of mine. Despite being someone that is fairly comfortable in a debugger, familiar with x86 assembly and has spent 2 decades troubleshooting complex software in large environments, the skill needed to pull off exploiting these vulnerabilities is incredible. When you take into account the work required to bypass somewhat recent developments like stack protection schemes, DEP, and ASLR, building the software to exploit these memory corruption problems is something you can spend your entire life failing at.<p>Sometimes, I have a hard enough time getting software to do what it&#x27;s legitimately supposed to do, never mind something it&#x27;s NOT supposed to do!<p>As a side note, there is are some folks that are pretty critical of Project Zero. The argument is that Google should be using these brilliant resources on creating defensive measures rather than playing whack-a-mole.<p>I don&#x27;t know one way or the other, but I sure enjoy reading what they post on that blog.
jtchangalmost 10 years ago
It is kind of scary how good the attackers are getting at exploiting code.<p>It must take a considerable amount of work to get proficient in analyzing and exploiting some of this code.
评论 #9791166 未加载