[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <3F1B1D92.5060201@ameritech.net>
From: dbailey27 at ameritech.net (northern snowfall)
Subject: RE: Full-Disclosure digest, Vol 1 #964 - 14 msgs
>
>
>Why waste your time recreating the wheel? There are several tools (ie:
>jecktor, packit, hping2) out there already can do the same thing, with
>hundreds of variations and more effectively?
>
I can't speak for the author, but in my case, I love to make my
own versions of things simply to learn how the particular vulnerability
is effected or manifested on a lower level. Also, for exploits that
are very straight forward, it is satisfying seeing the time that it
has taken to develop code. Then, I compare that time frame to previous
projects and see how my style develops and progresses into more
elegant solutions. Sometimes, it's simply a "why not?" situation.
Don
http://www.7f.no-ip.com/~north_
Powered by blists - more mailing lists