Results 1 to 6 of 6

Thread: How are exploits found?

  
  1. #1
    Organized_Chaos's Avatar
    Organized_Chaos is offline Senior Member -Hacks Titan
    Join Date
    May 2008
    Posts
    4,768
    Rep Power
    53963

    Default How are exploits found?

    So what would I need to study up on and learn about if I want to be the next DAX? Like.. what knowledge do you need in order to know what can potentially be used for an exploit?


  2. #2
    gunman121 is offline -Hacks Enthusiast
    Join Date
    Jul 2008
    Posts
    386
    Rep Power
    12

    Default

    Quote Originally Posted by Organized_Chaos View Post
    So what would I need to study up on and learn about if I want to be the next DAX? Like.. what knowledge do you need in order to know what can potentially be used for an exploit?
    programming
    Fat PSP: 1.50 OFW --> 2.80 OFW --> 3.50 OFW --> 3.80 OFW --> 3.90 OFW --> Pandora --> 3.71 m33 --> 3.90 m33 --> 4.01 m33 --> 5.00 m33-3
    Slim psp: 3.90 OFW --> Pandora --> Brick(Somehow?) --> DC v7 --> Still brick --> DC v7 format flash1 --> DC v5 --> 3.90 m33 --> 5.00m33-3

  3. #3
    Organized_Chaos's Avatar
    Organized_Chaos is offline Senior Member -Hacks Titan
    Join Date
    May 2008
    Posts
    4,768
    Rep Power
    53963

    Default

    Quote Originally Posted by gunman121 View Post
    programming
    Which language? C++? Java? Assembly? BASIC?

  4. #4
    ZiNgABuRgA's Avatar
    ZiNgABuRgA is offline Senior Member -Hacks Titan
    Join Date
    Sep 2006
    Location
    4CHIN
    Posts
    11,044
    Rep Power
    26

    Default

    There isn't just exploits - Dark_AleX has to do a fair bit of development, which is rather something different.
    For exploits though, knowledge of how systems work at a low level is useful.
    Finding an exploit isn't necessarily an easy or straightforward task. It's like finding a needle in a haystack without any guarantee that a needle exists in the haystack. There are potentially various ways which may help you, but this will depend on situation to situation and there's no general guideline for it really.

  5. #5
    higaki is offline -Hacks Newbie
    Join Date
    Dec 2009
    Posts
    26
    Rep Power
    0

    Default

    if it was that simple, we could see >9000 cfw on the net already

  6. #6
    psychobadger's Avatar
    psychobadger is offline -Hacks Enthusiast
    Join Date
    Nov 2009
    Posts
    491
    Rep Power
    10

    Default

    http://wololo.net/wagic/2009/03/11/f...ts-on-the-psp/
    That explains how its done and if you find something keep it private and only give it to well known hacking teams because they might be looking for an exploit

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •