Skip to content

Instantly share code, notes, and snippets.

@tin-z
Last active June 23, 2024 13:55
Show Gist options
  • Save tin-z/a469e996f8107a5ca8d3c858a2a4b65f to your computer and use it in GitHub Desktop.
Save tin-z/a469e996f8107a5ca8d3c858a2a4b65f to your computer and use it in GitHub Desktop.
Becoming a Vulnerability Researcher roadmap: my personal experience

Index



preprequisites



roadmap

In order:

  • Vulns1001 OST2 course

  • Do code auditing by your own, select a project, read docs, etc.

  • The XY-Z method:

    • You read a blog that talks about X by doing Y, but you can't understand its content
    • Then you learn X so you can replicate Y, and then you add Z which wasn't done before, even if it's a small change
    • pros: it boosts your confidence, you will remember the subjects stuided more easily by practicing than just by studying the theory
  • The XZ-Y method:

    • You read only the abstract of a blog that talks about X by doing Y
    • Then you learn X, then you do Z, which is how you would have resolved Y without knowing how the author implemented it. Finally, you compare your results with the author's.
    • pros: same as above + you learn how to think like a researcher
    • cons: difficult maybe
  • Ideally, you should first follow the XY-Z method, and then the XZ-Y method

  • fuzzing open source projects tutorial

  • Follow the same path you have followed for the code auditing tasks, but this time, do fuzzing

  • Vulns1002 OST2 course

    • do the labs by following the XZ-Y method
  • Work in progress...


IoT

V8



Notes

  • this is just my personal experience and should not reflect yours, so forgive me if I have skipped some important reference material 🤝
  • I don't feel confident enough to link material about the V8 engine. However, I'll include the links you suggest and write a blog post discussing them 📡
@tin-z
Copy link
Author

tin-z commented Jun 20, 2024

Sure, thanks!

@AmeerTheInteger
Copy link

Basics of v8, setting up debug env and reproducing CVE
https://www.matteomalvica.com/blog/2024/06/05/intro-v8-exploitation-maglev/

@tin-z
Copy link
Author

tin-z commented Jun 22, 2024

Basics of v8, setting up debug env and reproducing CVE https://www.matteomalvica.com/blog/2024/06/05/intro-v8-exploitation-maglev/

Done, thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment