It's just a scary topic, and I don't even know where to start. LiveOverflow, who is most well known for his hacking videos on YouTube, shares the same feeling about approaching browser exploitation in the early stage, saying:
And I don't think I'm the only person to feel this way. However, memory corruption for me is still quite a challenge, despite having a soft spot for it. More than 10 years later, I have some memory corruption exploits under my belt, from small-third-party applications to high-profile products such as Microsoft, Adobe, Oracle, Mozilla, and IBM. It wasn't until months later that I tried a different example on the internet and finally popped a shell. It was a stack buffer overflow example I tried to follow in this book called “ Hacking: The Art of Exploitation.” I fought for weeks, and I failed.
I remember the first time I attempted to exploit a memory corruption vulnerability.