[Article]-Book Review: A Bug Hunter’s Diary

Viewing 6 reply threads
  • Author
    • #7194
      Don Donzal

      Here’s the first of a few assignements for Tristan Lawson. Thanks for the hard work, especially during the holidays.

      Permanent link: [Article]-Book Review: A Bug Hunter’s Diary


      Review by Tristan Lawson, CISSP, MCSE: Security, GCIH, OSCP et al

      So often as security professionals we hear how bug hunters both black hat and white hat find vulnerabilities and release them to the vendor or use them for monetary gain. We wonder how they actually went about finding these vulnerabilities and what hurdles they had to jump to find them. “A Bug Hunter’s Diary: A Guided Tour Through the Wilds of Software Security” by Tobias Klein focuses on helping different levels of security professionals understand the approaches used to uncover vulnerabilities, testing the vulnerabilities found and finally reporting on those vulnerabilities. It is short and to the point and offers nothing but valuable content with little to no fluff content.

      The book was written as though Tobias was writing in a journal as he was progressing through his research of a particular application. Each chapter is a separate journal entry focused on a single application into which he dug and eventually found a vulnerability. He then determined if it was exploitable and in turn released it to either the vendor or to a vulnerability broker. This is a fascinating look into the heart of a sector of the security economy not previously exposed to a wider audience.

      After the break, look for a link to a free download of Chapter 2: “Back to the 90s”


    • #44947

      Great review, just purchased the book on my Kindle!

    • #44948

      I like the idea of it being written like a journal.  I’ve added this to my list of books to buy 🙂

    • #44949

      Saw this at the library a few weeks ago, might have to check it out.  Of course I’m currently reading:

      1. Web Application Hacker’s Handbook v2
      2. Hacking: Art of Exploitation
      3. Programming Ruby
      4. CCNA Library
      5. Metasploit: Pen Tester’s Guide

      And once I finish the Art of Exploitation, I have the Shellcoder’s handbook to go through.  I sure am glad I don’t have a paying job and have time to read all this!

    • #44950

      Not envious of lack of job, but envious of the free time you gain from said lack…

    • #44951

      I have the book, but not read it yet.
      You can download the source code, the videos and vulnerable software from the author’s website here : http://www.trapkit.de/books/bhd/en.html#videos

    • #44952

      I haven’t really checked this book out, but I noticed it on Nostarch’s website when I was looking into Gray Hat Python….

      I really like that these guys give you the ebook without charging anything extra when you buy the hard copy book from them…

      They have the Metasploit book by Dave Kennedy too, but we already have that in the work “library”….so no need to buy it again….

      You reviewers should put pressure on other publishers to adopt the same policy imo.. 😉

Viewing 6 reply threads
  • You must be logged in to reply to this topic.

Copyright ©2021 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.


Sign in with Caendra

Forgot password?Sign up

Forgot your details?