On the ‘net: Understanding the Exploit Market How do attackers find a vulnerability, write a piece of code to take advantage of that vulnerability — i.e., build an exploit — build a software delivery system around the exploit and then deliver the attack itself? The key point to recognize in this process is that no single person undertakes all of this work. @Search Networking Related Posted in ON THE NET, SECURITY ← Research: Even Password Complexity is a TradeoffHistory of Networking: The RFC Series →