Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
locating exploits in open source
May 22 2012 03:20PM
Littlefield, Tyler (tyler tysdomain com)
Before I dive into reverse engineering, I'd like to start off smaller.
I understand bits and pieces of some exploits, so I'd like to start work
on my own to help contribute somehow. Given source code to a project,
how do people usually proceed with finding exploits? I've played with
[ more ]
Copyright 2010, SecurityFocus