logoalt Hacker News

dfajgljsldkjagyesterday at 11:33 PM2 repliesview on HN

I was under the impression that once you have a vulnerability with code execution, writing the actual payload to exploit it is the easy part. With tools like pentools and etc is fairly straightforward.

The interesting part is still finding new potential RCE vulnerabilities, and generally if you can demonstrate the vulnerability even without demonstrating an E2E pwn red teams and white hats will still get credit.


Replies

tptacekyesterday at 11:40 PM

He's not starting from a vulnerability offering code execution; it's a memory corruption vulnerability (it's effectively a heap write).

frosting1337yesterday at 11:45 PM

It's as easy as drawing the rest of the owl, sure.