Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> I always wonder what it takes to find this kind of exploit. Are the programmers at NSO group just the best in the world?

Not much different too how software exploitation was done in Win98-ME-xp era was done.

A lot of vulnerabilities are very obvious from disassembly, and often can even be found with automated tools.

Today, it's easy. Back in early 200x, everybody was not only hiding their sources well, but obfuscating binaries in every way possible.

People just forgot the scale of binary only exploitation on its peak.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: