Do industry pros have VM's or various workstations setup to go through known exploits after they've been patched or is that less beneficial for learning than i'm imagining?
I'm thinking, how can you understand the buffer overflow attack, or another vulnerability, for such and such an application if you've never done it firsthand?
If this isn't the case how is knowledge effectively disseminated or learned?
Furthermore, are there repositories that detail exploits from point A to point B or are we generally expected to fill in the blanks?