This article is a must read for anyone who wants to understand the evolution of exploits. <a href="http://www.abysssec.com/blog/2010/05/pa">http://www.abysssec.com/blog/2010/05/pa</a> ... loitation/It also has some good links to get you started on writing exploits.