Well the past few weeks have been a little busy @ work so have not had much time to further my knowledge. I have managed to read about and try to understand how exploits are found and how the exploiter alters the application code to enable an exploit to run in an application, this was mainly utilising the buffer overflow method. There are some nice tutorials here @ Peter Van Eeckhouttes Blog http://www.corelan.be:8800/, there’s a great paper on buffer overflows etc on Insecure.org
Happy reading, I’m off to learn about ‘Fuzzing’ and any other security stuff I can get my hands on.
Catch you all soon.