A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security

By Tobias Klein

"This is without doubt one of the best infosec books to return out within the final numerous years."
–Dino Dai Zovi, details safety Professional

"Give a guy an take advantage of and also you make him a hacker for an afternoon; train a guy to take advantage of insects and also you make him a hacker for a lifetime."
–Felix 'FX' Lindner

Seemingly uncomplicated insects could have drastic results, permitting attackers to compromise structures, improve neighborhood privileges, and in a different way wreak havoc on a system.

A computer virus Hunter's Diary follows protection specialist Tobias Klein as he tracks down and exploits insects in a number of the world's hottest software program, like Apple's iOS, the VLC media participant, internet browsers, or even the Mac OS X kernel. during this exceptional account, you will see how the builders accountable for those flaws patched the bugs—or didn't reply in any respect. As you stick to Klein on his trip, you will achieve deep technical wisdom and perception into how hackers method tricky difficulties and adventure the real joys (and frustrations) of trojan horse hunting.

Along the best way you are going to find out how to:

  • Use field-tested concepts to discover insects, like making a choice on and tracing consumer enter information and opposite engineering
  • Exploit vulnerabilities like NULL pointer dereferences, buffer overflows, and kind conversion flaws
  • Develop evidence of thought code that verifies the safety flaw
  • Report insects to owners or 3rd get together brokers

A malicious program Hunter's Diary is choked with real-world examples of weak code and the customized courses used to discover and attempt insects. even if you are looking insects for enjoyable, for revenue, or to make the area a more secure position, you will examine worthwhile new abilities by means of taking a look over the shoulder of a pro trojan horse hunter in action.

Show description

Quick preview of A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security PDF

Similar Computer Science books

Web Services, Service-Oriented Architectures, and Cloud Computing, Second Edition: The Savvy Manager's Guide (The Savvy Manager's Guides)

Net providers, Service-Oriented Architectures, and Cloud Computing is a jargon-free, hugely illustrated clarification of the way to leverage the speedily multiplying prone to be had on the net. the way forward for company is determined by software program brokers, cellular units, private and non-private clouds, enormous info, and different hugely hooked up expertise.

Software Engineering: Architecture-driven Software Development

Software program Engineering: Architecture-driven software program improvement is the 1st complete advisor to the underlying abilities embodied within the IEEE's software program Engineering physique of information (SWEBOK) ordinary. criteria specialist Richard Schmidt explains the conventional software program engineering practices well-known for constructing tasks for presidency or company structures.

Platform Ecosystems: Aligning Architecture, Governance, and Strategy

Platform Ecosystems is a hands-on advisor that provides a whole roadmap for designing and orchestrating brilliant software program platform ecosystems. in contrast to software program items which are controlled, the evolution of ecosystems and their myriad members needs to be orchestrated via a considerate alignment of structure and governance.

Additional resources for A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security

Show sample text content

While you're new to vulnerability study, this booklet may also help you to get familiar with different elements of looking, exploiting, and reporting software program vulnerabilities. while you're an already-experienced trojan horse hunter, this publication will supply a brand new standpoint on commonly used demanding situations and should most likely make you snort every now and then — or positioned a figuring out smile in your face. Disclaimer The objective of this e-book is to coach readers easy methods to establish, shield opposed to, and mitigate software program safety vulnerabilities. knowing the options used to discover and make the most vulnerabilities is critical to completely clutch the underlying difficulties and acceptable mitigation thoughts. seeing that 2007, it truly is now not criminal to create or distribute “hacking instruments” in Germany, my domestic kingdom. Such instruments contain uncomplicated port scanners in addition to operating exploits. as a result, to conform with the legislation, no complete operating make the most code is supplied during this e-book. The examples easily exhibit the stairs used to realize keep watch over of the execution move (the guide pointer or software counter regulate) of a susceptible software. assets All URLs referenced in the course of the booklet in addition to the code examples, errata, updates, and different details are available at http://www. trapkit. de/books/bhd/. bankruptcy 1. trojan horse looking malicious program looking is the method of discovering insects in software program or undefined. during this ebook, notwithstanding, the time period computer virus searching should be used in particular to explain the method of discovering security-critical software program insects. Security-critical insects, also referred to as software program protection vulnerabilities, permit an attacker to remotely compromise structures, strengthen neighborhood privileges, move privilege barriers, or in a different way wreak havoc on a process. a few decade in the past, trying to find software program safeguard vulnerabilities was once in general performed as a pastime or with the intention to achieve media cognizance. computer virus looking came across its approach into the mainstream while humans discovered that it’s attainable to learn from vulnerabilities. [1] software program safety vulnerabilities, and courses that reap the benefits of such vulnerabilities (known as exploits), get loads of press insurance. moreover, a number of books and net assets describe the method of exploiting those vulnerabilities, and there are perpetual debates over the right way to expose trojan horse findings. regardless of all this, strangely little has been released at the bug-hunting approach itself. even supposing phrases like software program vulnerability or make the most are regular, many of us — even many info safeguard pros — don’t understand how computer virus hunters locate protection vulnerabilities in software program. if you happen to ask 10 various computer virus hunters how they seek via software program for security-related insects, you are going to probably get 10 diverse solutions. this can be one of many the explanation why there isn't, and possibly isn't, a “cookbook” for malicious program searching. instead of making an attempt and failing to write down a publication of generalized directions, i'm going to describe the ways and methods that I used to discover particular insects in real-life software program. expectantly this publication might help you strengthen your individual sort so that you can locate a few fascinating security-critical software program insects.

Download PDF sample

Rated 4.35 of 5 – based on 35 votes