Exploit development (10)
Think of exploits as the bullets in hackers’ artillery. All the tools in hackers’ arsenal and all of the hackers’ actions were absurd without exploits. Exploits in simple words are some kind of data that are designed to perform a malicious action; normally the artifact is not designed to do so! Hackers somehow find a bug in a software (or hardware) and make use of that bug to build an exploit and take control of the system or perform other actions by running the exploit. Running the exploit is simply sending the crafted data to the software.
The main concentration of this category is buffer overflow exploits. Buffer overflow exploits make use of a special type of software bugs and are the most devastating type of hacker weapons. In the introduction to the buffer overflow exploit development you learn all you need for other advanced materials in exploitation area.
Most of the materials found in this category are adopted from The Art of Exploitation, A Guide to Kernel Exploitation and The Shellcoders Handbook. If you want to become a “REAL” hacker I strongly recommend you read these books.