How are hackers able to find such complicated exploits?

1.06K views

How are hackers able to find such complicated exploits?

In: Technology

44 Answers

Anonymous 0 Comments

The best way to look at the exploit process is to look at examples.

A couple of great books to read (I did the audio books) for how the end to end exploit process works in some real world examples are Sandstorm (First state sponsored (allegedly Russia) cyber attack on civilian infrastructure (Ukrainian power plants), countdown to zero day (Stuxnet – attack of Iranian centrifuges and first state sponsored attack crossing boundaries from cyber world to the physical world). Another great audio book on a 50k foot view on the history of espionage that puts a lot of global events into context is Cyberspies by Gordon Corera.

You are viewing 1 out of 44 answers, click here to view all answers.