Stay updated on the latest vulnerability exploitation techniques with insights from Redditors. Here are some key highlights:
Exploitability Over Severity: Many experts believe that the exploitability of a vulnerability should be the primary factor in determining its priority, rather than just its severity score. "If it’s exploitable in your setup, it’s critical. If not, stop patching dashboards and start patching risk."
Combining Risk and Vulnerability Management: A holistic approach that combines risk management with vulnerability management can be more effective. "A VUln with an attack path is a higher risk, and should be prioritized higher."
Focus on High-Value Targets: Some organizations are using tools to identify and prioritize vulnerabilities that provide critical exploit paths to high-value assets. "The cutting edge of vulnerability management uses tools like Horizon3's NodeZero to actively pen test every vulnerability."
Antivirus Exploitation: Attackers are now capable of injecting malicious code into antivirus processes to create backdoors. "Hackers clone antivirus services and hijack cryptographic providers to implement backdoors."
GeoServer Exploitation: A major US federal agency was breached by exploiting a known vulnerability in GeoServer. "A year-old vulnerability in GeoServer was exploited by hackers to gain unauthorized access to a US federal agency."
Unity Game Exploitation: A long-standing security vulnerability in Unity games has been discovered, which could allow malicious actors to execute arbitrary code. "If a malicious actor were to put something malicious in certain folders, unity games would execute them within their context."
Online Platforms: Resources like pwn.college, OST2.fyi, and Ret2 Wargames are highly recommended for learning basic to advanced exploit development. "Start with pwn.college. They have everything from buffer overflows to format string exploits to micro architecture exploits."
Practical Experience: Engaging in real-world scenarios, such as writing N-days for known vulnerabilities, is crucial. "Download vulnerable software in VM and run the exploit."
Training and Certifications: Consider professional training like Corelan, SANS courses, and certifications such as OSED for structured learning. "Corelan training is great."
These communities can provide additional insights and support as you delve deeper into the field of vulnerability exploitation.