Re: Good advice: Learn Assembly

Hi Jim..
Answer to your question lies with you. Just try to figure out how will
you find vulnerabilities (and try to develop some exploit as PoC) if
you are not given source code, rather you get binary to play with. By
doing a black-box type testing, u can find the present of bug, but may
not be able to exploit it or do any analysis to have clear
understanding. I agree that metasploit and ollydbg are great tools,
but still understanding stack.heap, EIP, ESP etc help you to get
things done in your own way. And yes, you need not to be an expert in
assembly to start. Its about Science of Vulnerability Analysis, when
such fundamental knowledge is sought :)


On Sat, Aug 16, 2008 at 11:48 PM, Jim Kelly <macubergeek@xxxxxxxxxxx> wrote:
I have a personal goal of learning how to find vulnerabilities with fuzzers
and code POCs (preferably in Python).

Now I've gotten the traditional advice of "learn assembly" from a couple of
folks. I wonder if that is necessary these days.
I always thought one needed to learn assembly to code shell code. With the
capabilities of Metasploit, I wonder if this is still true? Do you need to
know assembly coding to decipher the output of disassemblers like IDA Pro or
debuggers like Olly?

Setting aside the logistical problems of finding a local college that still
teaches I overlooking something here?

All comments welcome.


This list is sponsored by: Cenzic

Top 5 Common Mistakes inSecuring Web Applications
Get 45 Min Video and PPT Slides

Computer Security Learner

This list is sponsored by: Cenzic

Top 5 Common Mistakes in
Securing Web Applications
Get 45 Min Video and PPT Slides

Relevant Pages

  • Carbon Communities forum Multiple Vulnerabilities.
    ... Multiple Vulnerabilities in Carbon Communities forum. ... Carbon Communities is a high powered, fully scalable, and highly customizable online portal, message boards/ bulletin board, discussion hub, Private messaging, Event Calendars, Emails and chat software rolled into one. ... POC: ... attacker can send any password to his/her email address. ...
  • Multiple Cross-Site Scripting (XSS) in Kajona
    ... High-Tech Bridge Security Research Lab has discovered multiple Cross-Site Scripting vulnerabilities in Kajona. ... This can be exploited to execute arbitrary HTML and script code in user's browser session in context of affected website. ... The following PoC demonstrate the vulnerabilities: ...
  • RE: How do VA scans work technically
    ... Qualys and Nessus do exploit the vulnerabilities. ... Get 45 Min Video and PPT Slides ...
  • Developing an Exploit Code
    ... learn how an exploit can be developed looking at a poc. ... 1- Point to a resource where I can read something about development of ... 2- Example source code of some existing vulnerabilities would really help. ...
  • [Full-disclosure] phpMyAdmin 3.x preg_replace RCE POC
    ... I'm flooded with requests for a POC and many doubt that these ... vulnerabilities are exploitable. ... Hosted and sponsored by Secunia - ...