Does creating your own hacking tools exploit development and reverse engineering at a high level require high-level math

+1 vote
I’m interested in getting deeper into ethical hacking, exploit development, and reverse engineering. However, I’ve heard that advanced hacking often requires a solid understanding of mathematics, especially when working on cryptography, shellcode development, and buffer overflows.

What specific areas of math are necessary for these tasks? Is it possible to develop effective hacking tools and perform reverse engineering without extensive knowledge of advanced math, or are there certain mathematical concepts that are essential to learn for these purposes?
Oct 21, 2024 in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
198 views

1 answer to this question.

+1 vote

It really depends on the specific areas you're focusing on. You don't need to be a math genius, but certain areas of Ethical Hacking and Security Research do require a solid understanding of mathematics, especially in cryptography and certain types of advanced exploit development.

1. Cryptography

Cryptography and related fields will require you to understand high-level math concepts like modular arithmetic, prime factorization, and discrete logarithms.

2. Exploit Development & Reverse Engineering

Exploit Development and Reverse Engineering require more logical thinking, basic arithmetic, and an understanding of memory structure rather than complex math.

3. Tool Development

Tool Development relies on discrete mathematics, which is essential for creating reliable and efficient hacking tools.

4. Specialized Attacks

Specialized Attacks like timing attacks may require knowledge of statistical analysis.

So while math plays a role, especially in cryptography and some advanced attack methods, much of hacking revolves around logical reasoning, understanding systems, and leveraging vulnerabilities.

You can still be effective in most areas of ethical hacking without needing advanced math unless you are delving into cryptography or advanced tool creation

answered Oct 23, 2024 by CaLLmeDaDDY
• 13,760 points
Great point about cryptography! I'd add that fields like machine learning for anomaly detection in cybersecurity might also need some mathematical understanding, especially in linear algebra and probability.

Related Questions In Cyber Security & Ethical Hacking

0 votes
0 answers
0 votes
0 answers

How do I find and exploit an insecure API endpoint in a mobile app?

How do I find and exploit an ...READ MORE

Oct 14, 2024 in Cyber Security & Ethical Hacking by Anupam
• 9,050 points
94 views
0 votes
1 answer
0 votes
1 answer
+1 vote
1 answer

How do you decrypt a ROT13 encryption on the terminal itself?

Yes, it's possible to decrypt a ROT13 ...READ MORE

answered Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
181 views
+1 vote
1 answer

How does the LIMIT clause in SQL queries lead to injection attacks?

The LIMIT clause in SQL can indeed ...READ MORE

answered Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
344 views
+1 vote
1 answer

Is it safe to use string concatenation for dynamic SQL queries in Python with psycopg2?

The use of string concatenation while building ...READ MORE

answered Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
188 views
+1 vote
1 answer
+1 vote
1 answer

How do I find and exploit an insecure API endpoint in a mobile app?

In order to locate and test insecure ...READ MORE

answered Oct 24, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
188 views
0 votes
1 answer

At which OSI layer does NetBIOS operate, and why is this important?

NetBIOS (Network Basic Input/Output System) primarily operates ...READ MORE

answered Dec 20, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 13,760 points
58 views
webinar REGISTER FOR FREE WEBINAR X
REGISTER NOW
webinar_success Thank you for registering Join Edureka Meetup community for 100+ Free Webinars each month JOIN MEETUP GROUP