take many shapes May need many different bugs Vulnerability discovery is about code understanding Among some other things “code” can also mean “some binaries” “understanding” can be achieved through fuzzing
into an exploit? Usually the goal of an exploit is running code Sometimes the scenarios are weird and this is not the case Exploit development can be thought of as program synthesis Instead of using if, else, you are using buffer overflows
software You’ll need some software of your own Launch your exploits Rootkits (yeah, meterpreter might not be good enough) Monitor your systems for compromise Coordinate activity amongst your team members This is software development EVIL
computers like normal people use computers How do you hide yourself? How do you detect other hidden people? Amusing: fighting covertly with another team for control of a third teams system Even more amusing: when this happens by accident This is being a bastard sysadmin from hell
of practice to get it right It takes a lot of doing to get it right There are multiple skills overlaid on multiple domains We didn’t even really talk about web stuff
CTF team is doing what a “normal” security shop would do day to day Doing this should give a lot of insight into what goes on in the “real world” ON EASY MODE