TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: How automated is exploit-generation these days?

1 点作者 lopsidedBrain超过 4 年前
I religiously apply patches to all my personal machines as soon as they become available. But I&#x27;ve recently been wondering about how much of a difference it makes today. I used to follow this space fairly closely 4-5 years ago, but I don&#x27;t know what has changed since then.<p>Once a typical use-after-free vulnerability is disclosed publicly, for example, how quickly does it get weaponized? I remember reading some academic papers a while back, which claimed to be able to automatically generate exploits from a patch. I believe ROP compilers exist also that will take some logic and string it together with a given set of gadgets in a binary. What is the current state of all that tooling?<p>Bottomline: Are there stats (e.g. from honeypots) that tell us the likelihood of a typical laptop&#x2F;mobile user being compromised based on a given security flaw, given the amount of time they run unpatched after disclosure?<p>I figured there must be experts here who have been keeping up with all of this better than I have. I&#x27;d love to hear from you all!

1 comment

kdbg超过 4 年前
Are there stats, not that I&#x27;m aware of. There might be its just not my area. I am more aware on the exploit development side of things though.<p>The process of going from a bug to a weaponized exploit though is still largely manual. Yes some tooling exists that may automate certain tasks, however these tools often only work as proof of concepts. ROP compilers are a great example, they &quot;work&quot; but they are are usually far more prone to crashing than one compiled by hand, as such wouldn&#x27;t be used in the real world.<p>Thats just kinda the general truth, ignoring the many cases where the automated offering just don&#x27;t work at all, when they do its often not weaponized to a useful degree. You might thing that you could then use what it does as a starting place, but it takes a lot of time to now reverse what the script did and figure out what can&#x2F;should be changed, similar to having just done it yourself in the first place and not being constrained.<p>That said there has been some research in augmenting the workflow by discovering exploit strategy candidates. I forget the name right now, but there was a paper early this year presenting a capability guided fuzzer that focused on &quot;fuzzing&quot; OOB Write vulns to expand them and discover viable exploit strategies for them.