Tobias Klein 德国著名信息安全咨询与研究公司NESO安全实验室创始人,资深软件安全研究员,职业生涯中发现的软件安全漏洞无数,更曾为苹果、微软等公司的产品找出不少漏洞。除本书外,还出版过两本信息安全方面的德文作品。
张伸 不合格码农。爱咖啡,爱葡萄酒。爱听布鲁斯,也爱吃巧克力。不小资,不文青,只是喜欢收藏图书和CD。慢生活,每天听相声才能入睡。twitter和新浪微博:@loveisbug。
"Give a man an exploit and you make him a hacker for a day; teach a man to exploit bugs and you make him a hacker for a lifetime." -Felix 'FX' Lindner Seemingly simple bugs can have drastic consequences, allowing attackers to compromise systems, escalate local privileges, and otherwise wreak havoc on a system. A Bug Hunter's Diary follows security expert Tobias Klein as he tracks down and exploits bugs in some of the world's most popular software, like Apple's iOS, the VLC media player, web browsers, and even the Mac OS X kernel. In this one-of-a-kind account, you'll see how the developers responsible for these flaws patched the bugs-or failed to respond at all. As you follow Klein on his journey, you'll gain deep technical knowledge and insight into how hackers approach difficult problems and experience the true joys (and frustrations) of bug hunting. Along the way you'll learn how to: * Use field-tested techniques to find bugs, like identifying and tracing user input data and reverse engineering * Exploit vulnerabilities like NULL pointer dereferences, buffer overflows, and type conversion flaws * Develop proof of concept code that verifies the security flaw * Report bugs to vendors or third party brokers A Bug Hunter's Diary is packed with real-world examples of vulnerable code and the custom programs used to find and test bugs. Whether you're hunting bugs for fun, for profit, or to make the world a safer place, you'll learn valuable new skills by looking over the shoulder of a professional bug hunter in action.
Mark Dowd et al The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities (Addison-Wesley, 2007) Fuzzing Michael Sutton et al Fuzzing: Brute Force Vulnerability Discovery
评分Although no formal documentation exists that describes the standard bug-hunting process, common techniques do exist. These techniques can be split into 2 categories: static and dynamic. In static analysis, also referred to as static code analysis, the sour...
评分Although no formal documentation exists that describes the standard bug-hunting process, common techniques do exist. These techniques can be split into 2 categories: static and dynamic. In static analysis, also referred to as static code analysis, the sour...
评分趣味读物
评分趣味读物
评分作者有那么点啰嗦,但讲得真心清楚,作为小白也能看
评分趣味读物
评分趣味读物
本站所有内容均为互联网搜索引擎提供的公开搜索信息,本站不存储任何数据与内容,任何内容与数据均与本站无关,如有需要请联系相关搜索引擎包括但不限于百度,google,bing,sogou 等
© 2025 book.quotespace.org All Rights Reserved. 小美书屋 版权所有