Download E-books A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security PDF

By Tobias Klein

"This is likely one of the finest infosec books to return out within the final a number of years."
–Dino Dai Zovi, details safeguard Professional

"Give a guy an take advantage of and also you make him a hacker for an afternoon; train a guy to take advantage of insects and also you make him a hacker for a lifetime."
–Felix 'FX' Lindner

Seemingly easy insects could have drastic effects, permitting attackers to compromise platforms, boost neighborhood privileges, and another way wreak havoc on a system.

A trojan horse Hunter's Diary follows safeguard specialist Tobias Klein as he tracks down and exploits insects in a few of the world's hottest software program, like Apple's iOS, the VLC media participant, internet browsers, or even the Mac OS X kernel. during this unique account, you will see how the builders answerable for those flaws patched the bugs—or didn't reply in any respect. As you stick to Klein on his trip, you will achieve deep technical wisdom and perception into how hackers process tough difficulties and adventure the genuine joys (and frustrations) of trojan horse hunting.

Along the best way you will learn the way to:

  • Use field-tested ideas to discover insects, like determining and tracing person enter info and opposite engineering
  • Exploit vulnerabilities like NULL pointer dereferences, buffer overflows, and kind conversion flaws
  • Develop evidence of inspiration code that verifies the protection flaw
  • Report insects to proprietors or 3rd get together brokers

A computer virus Hunter's Diary is filled with real-world examples of weak code and the customized courses used to discover and try out insects. even if you are looking insects for enjoyable, for revenue, or to make the realm a more secure position, you are going to research precious new abilities by means of taking a look over the shoulder of a pro malicious program hunter in action.

Show description

Read or Download A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security PDF

Similar Computer Science books

Programming Massively Parallel Processors: A Hands-on Approach (Applications of GPU Computing Series)

Programming vastly Parallel Processors discusses easy techniques approximately parallel programming and GPU structure. ""Massively parallel"" refers back to the use of a giant variety of processors to accomplish a suite of computations in a coordinated parallel manner. The booklet info a variety of recommendations for developing parallel courses.

TCP/IP Sockets in C#: Practical Guide for Programmers (The Practical Guides)

"TCP/IP sockets in C# is a superb e-book for somebody attracted to writing community functions utilizing Microsoft . internet frameworks. it's a certain blend of good written concise textual content and wealthy conscientiously chosen set of operating examples. For the newbie of community programming, it is a sturdy beginning publication; nonetheless execs reap the benefits of very good convenient pattern code snippets and fabric on subject matters like message parsing and asynchronous programming.

Computational Network Science: An Algorithmic Approach (Computer Science Reviews and Trends)

The rising box of community technology represents a brand new type of learn that may unify such traditionally-diverse fields as sociology, economics, physics, biology, and laptop technology. it's a robust instrument in reading either typical and man-made platforms, utilizing the relationships among gamers inside of those networks and among the networks themselves to achieve perception into the character of every box.

Computer Organization and Design: The Hardware Software Interface: ARM Edition (The Morgan Kaufmann Series in Computer Architecture and Design)

The recent ARM version of machine association and layout contains a subset of the ARMv8-A structure, that's used to provide the basics of applied sciences, meeting language, desktop mathematics, pipelining, reminiscence hierarchies, and I/O. With the post-PC period now upon us, desktop association and layout strikes ahead to discover this generational swap with examples, workouts, and fabric highlighting the emergence of cellular computing and the Cloud.

Additional resources for A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security

Show sample text content

Text:000109B8 mov esi, [eax+8] ; ULONG InputBufferLength . text:000109BB mov [ebp+var_1C], esi ; keep InputBufferLength in var_1C . text:000109BE mov edx, [eax+4] ; ULONG OutputBufferLength . text:000109C1 mov [ebp+var_3C], edx ; shop OutputBufferLength in var_3C . text:000109C4 mov eax, [eax+0Ch] ; ULONG IoControlCode . text:000109C7 mov ecx, 0B2D6002Ch ; ecx = 0xB2D6002C . text:000109CC cmp eax, ecx ; evaluate 0xB2D6002C with IoControlCode . text:000109CE ja loc_10D15 [.. ] As i discussed prior to, a pointer to _IO_STACK_LOCATION is kept in EAX at tackle . text:000109B5, after which at handle . text:000109B8 the InputBufferLength is saved in ESI. At . text:000109BE the OutputBufferLength is kept in EDX, and at . text:000109C4 the IoControlCode is saved in EAX. Later, the asked IOCTL code saved in EAX is in comparison with the worth 0xB2D6002C (see handle . text:000109C7 and . text:000109CC). howdy, i discovered the 1st legitimate IOCTL code of the driving force! I searched the functionality for all values which are in comparison with the asked IOCTL code in EAX and received an inventory of the supported IOCTLs of Aavmker4. sys. Step five: locate the User-Controlled enter Values After I generated the record of the entire supported IOCTLs, i attempted to find the buffer containing the user-supplied IOCTL enter info. All IRP_MJ_DEVICE_CONTROL requests offer either an enter buffer and an output buffer. the best way the approach describes those buffers will depend on the knowledge move kind. The move kind is kept within the IOCTL code itself. below Microsoft home windows, the IOCTL code values are usually created utilizing the CTL_CODE macro. [71] Here’s one other excerpt from ntddk. h: [.. ] // // Macro definition for outlining IOCTL and FSCTL functionality keep an eye on codes. word // that functionality codes 0-2047 are reserved for Microsoft company, and // 2048-4095 are reserved for patrons. // #define CTL_CODE( DeviceType, functionality, procedure, entry ) ( \ ((DeviceType) << sixteen) | ((Access) << 14) | ((Function) << 2) | (Method) \ ) [.. ] // // outline the strategy codes for a way buffers are handed for I/O and FS controls // #define METHOD_BUFFERED zero #define METHOD_IN_DIRECT 1 #define METHOD_OUT_DIRECT 2 #define METHOD_NEITHER three [.. ] The move style is distinct utilizing the strategy parameter of the CTL_CODE macro. I wrote a bit software to bare which info move variety is utilized by the IOCTLs of Aavmker4. sys: instance 6-1. a bit software that I wrote (IOCTL_method. c) to teach which info move style is utilized by the IOCTLs of Aavmker4. sys 01 #include 02 #include 03 04 int 05 major (int argc, char *argv[]) 06 { 07 unsigned int technique = zero; 08 unsigned int code = zero; 09 10 if (argc ! = 2) { eleven fprintf (stderr, "Usage: %s \n", argv[0]); 12 go back 1; thirteen } 14 15 code = strtoul (argv[1], (char **) NULL, 16); sixteen process = code & three; 17 18 swap (method) { 19 case zero: 20 printf ("METHOD_BUFFERED\n"); 21 holiday; 22 case 1: 23 printf ("METHOD_IN_DIRECT\n"); 24 holiday; 25 case 2: 26 printf ("METHOD_OUT_DIRECT\n"); 27 holiday; 28 case three: 29 printf ("METHOD_NEITHER\n"); 30 holiday; 31 default: 32 fprintf (stderr, "ERROR: invalid IOCTL information move method\n"); 33 holiday; 34 } 35 36 go back zero; 37 } I then compiled the software with the command-line C compiler of visible Studio (cl): C:\BHD>cl /nologo IOCTL_method.

Rated 4.87 of 5 – based on 16 votes