Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Depends on what you are trying to exploit I imagine, there are a huge number of different techniques out there.

Have a look at http://www.securityfocus.com/archive/1

and if you can get some sample exploit code and study it.

Then perhaps study some of your own programs with a more devious mindset and figure out what you have forgotten to take into account.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: