You are viewing our Forum Archives. To view or take place in current topics click here.
Exploit Development Tutorial Q/A
Posted:

Exploit Development Tutorial Q/APosted:

ExploitNinja
  • New Member
Status: Offline
Joined: Jul 19, 20176Year Member
Posts: 7
Reputation Power: 5
Status: Offline
Joined: Jul 19, 20176Year Member
Posts: 7
Reputation Power: 5
Hello everyone! I am currently in the process in making a intro to exploit development deep dive tutorial series for Windows 32 bit (maybe incorporate linux as well). I have a few questions I would like to ask that could give me a decent understanding of how I should look to build this tutorial series out. Also to get a general feel for how much community interest is in this area of modding and computer related things.

For me I started out with modding back in 2009 and switched interest into Web application security, mobile security and binary exploitation recently. I know some people I have spoken to have shown interest in this topic and was curious if others are as well?


The main questions I have are what subject mostly interests you?

1- Web application security
2- Mobile security
3- Reverse Engineering/Exploit development

The reason for this is after this first series of intro to 32 bit exploitation I would like to build others for this site and community as well. I just need to get a decent idea of what people would like to see next =)
#2. Posted:
ip
  • Winter 2017
Status: Offline
Joined: Dec 30, 201211Year Member
Posts: 3,778
Reputation Power: 3016
Status: Offline
Joined: Dec 30, 201211Year Member
Posts: 3,778
Reputation Power: 3016
I would probably say people without programming knowledge wouldn't get very far with it. But I'd like to see a little intro into getting through the reverseme programs that help teach people about reverse engineering. I've done the course and it never really stuck. I'd like to see how other people have done it to help me along with it as well.
Jump to:
You are viewing our Forum Archives. To view or take place in current topics click here.