14 Fixing Exploits
- 14.1 Fixing Memory Corruption Exploits
- 14.1.1 Buffer Overflow in a Nutshell
- 14.1.2 Importing and Examining the Exploit
- 14.1.3 Cross-Compiling Exploit Code
- 14.1.4 Fixing the Exploit
- 14.1.5 Changing the Overflow Buffer
- 14.2 Fixing Web Exploits
- 14.2.1 Considerations and Overview
- 14.2.2 Selecting the Vulnerability and Fixing the Code
- 14.2.3 Troubleshooting the “index out of range” Error
- 14.3 Wrapping Up
15 Locating Public Exploits
- 15.1 Getting Started
- 15.1.1 A Word of Caution
- 15.2 Online Exploit Resources
- 15.2.1 The Exploit Database
- 15.2.2 Packet Storm
- 15.2.3 GitHub
- 15.2.4 Google Search Operators
- 15.3 Offline Exploit Resources
- 15.3.1 Exploit Frameworks
- 15.3.2 SearchSploit
- 15.3.3 Nmap NSE Scripts
- 15.4 Exploiting a Target
- 15.4.1 Putting It Together
- 15.5 Wrapping Up