Hacker News new | past | comments | ask | show | jobs | submit login

> I always wonder what it takes to find this kind of exploit.

A lot of knowledge about the target system's internals (comes with experience) and probably a lot of investment in fuzzing infrastructure or A LOT of time reverse engineering and reviewing manually. Finding bugs in closed source software by hand is incredibly slow and painful.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: