Fixing Exploits

Introduction

  • Sometimes we need to fix the exploits we find online to make it suitable for our use case (For example, when an exploit is written for Windows Server 2012 and you want to use it on Windows Server 2010)

  • These target-specific variables explain why online resources host multiple exploits for the same vulnerability, each written for different target operating system versions and architectures.

  • We may also benefit from porting an exploit to a different language in order to include additional pre-written libraries and extend the exploit functionality by importing it to an attack framework.

Fixing Memory Corruption Exploits

  • Memory corruption exploits, such as buffer overflows, are relatively complex and can be difficult to modify.

Last updated