August 5th, 2024

The tragedy of low-level exploitation

The blog post outlines the challenges of pursuing a career in low-level exploitation in cybersecurity, noting limited job opportunities and the preference for existing exploits over new development.

Read original articleLink Icon
The tragedy of low-level exploitation

The blog post discusses the challenges and realities of pursuing a career in low-level exploitation within cybersecurity. It highlights that while low-level exploitation is a technically complex and rewarding field, job opportunities are limited and often integrated into broader roles. The author emphasizes that most companies prefer to invest in skills that provide immediate benefits, leading to a scarcity of positions focused solely on low-level exploitation. The post outlines various roles in cybersecurity, such as penetration testers and internal security teams, noting that they typically rely on existing exploits rather than developing new ones. The author also mentions that law enforcement and military roles do not primarily focus on exploit development, while intelligence agencies may engage in such activities, albeit in a morally ambiguous context. The goal of the post is to inform aspiring professionals about the realities of the field, encouraging them to consider their career paths thoughtfully rather than naively.

- Low-level exploitation is technically complex but has limited job opportunities.

- Most cybersecurity roles involve using existing exploits rather than developing new ones.

- Companies prioritize skills that provide immediate benefits, impacting the demand for low-level exploitation expertise.

- Intelligence agencies may engage in low-level exploitation, but this often involves ethical dilemmas.

- Aspiring professionals should carefully consider their career paths in cybersecurity.

Link Icon 8 comments
By @tptacek - 6 months
This is a pretty great post. One of its subtexts is the cliche of people taking jobs in offensive security and complaining that all they get to work on are web apps --- web apps are where all the money is, and where most new software is built. Another interesting subtext: there's a whole variety of low-level targets where modern exploit development techniques would come into play, but since there's no market for those vulnerabilities, there aren't many opportunities to get paid to develop the exploits; all the action is in browsers and mobile operating systems, where competition is incredibly fierce.
By @guardiangod - 6 months
>low-level exploitation is rarely needed in cybersecurity

Sadly that's true. I am transferring from a low level pentester to web app security engineer. That's where all the jobs are. People don't really care how much you know about low level.

By @abhaynayar - 6 months
Also, video going over the blog post by the author: https://www.youtube.com/watch?v=58fwUXvhO3c
By @armitron - 6 months
Mark Dowd's 2023 presentation "Inside The Zero Day Market" [0] is extremely informative and a must read for everyone interested in a low-level exploitation career.

[0] https://github.com/mdowd79/presentations/blob/main/bluehat20...

By @rapjr9 - 6 months
He left out education. Become a computer scientist and do research in exploits and you're getting paid to create exploits. There are lots of profs doing it, I've known some of them, they call it research. Companies don't usually pay for general research in exploits, but universities do.
By @atemerev - 6 months
You can sell low-level exploits quite profitably. You don’t need to make it, like, an official employment. If you can find gold, why be employed in a gold-mining company for a salary if you can just sell your findings?