- This topic has 6 replies, 7 voices, and was last updated 9 years, 1 month ago by
Tseug.
-
AuthorPosts
-
-
December 28, 2011 at 4:33 pm #7194
Don Donzal
KeymasterHere’s the first of a few assignements for Tristan Lawson. Thanks for the hard work, especially during the holidays.
Permanent link: [Article]-Book Review: A Bug Hunter’s Diary
[align=center:1h2ea7gv]
[/align:1h2ea7gv]
Review by Tristan Lawson, CISSP, MCSE: Security, GCIH, OSCP et al
So often as security professionals we hear how bug hunters both black hat and white hat find vulnerabilities and release them to the vendor or use them for monetary gain. We wonder how they actually went about finding these vulnerabilities and what hurdles they had to jump to find them. “A Bug Hunter’s Diary: A Guided Tour Through the Wilds of Software Security” by Tobias Klein focuses on helping different levels of security professionals understand the approaches used to uncover vulnerabilities, testing the vulnerabilities found and finally reporting on those vulnerabilities. It is short and to the point and offers nothing but valuable content with little to no fluff content.
The book was written as though Tobias was writing in a journal as he was progressing through his research of a particular application. Each chapter is a separate journal entry focused on a single application into which he dug and eventually found a vulnerability. He then determined if it was exploitable and in turn released it to either the vendor or to a vulnerability broker. This is a fascinating look into the heart of a sector of the security economy not previously exposed to a wider audience.
After the break, look for a link to a free download of Chapter 2: “Back to the 90s”
Enjoy,
Don -
December 29, 2011 at 8:32 am #44947
the_Grinch
ParticipantGreat review, just purchased the book on my Kindle!
-
December 29, 2011 at 4:39 pm #44948
lorddicranius
ParticipantI like the idea of it being written like a journal. I’ve added this to my list of books to buy 🙂
-
December 31, 2011 at 10:06 pm #44949
Seen
ParticipantSaw this at the library a few weeks ago, might have to check it out. Of course I’m currently reading:
1. Web Application Hacker’s Handbook v2
2. Hacking: Art of Exploitation
3. Programming Ruby
4. CCNA Library
5. Metasploit: Pen Tester’s GuideAnd once I finish the Art of Exploitation, I have the Shellcoder’s handbook to go through. I sure am glad I don’t have a paying job and have time to read all this!
-
December 31, 2011 at 11:16 pm #44950
hayabusa
ParticipantNot envious of lack of job, but envious of the free time you gain from said lack…
-
January 2, 2012 at 8:38 am #44951
n3r
ParticipantI have the book, but not read it yet.
You can download the source code, the videos and vulnerable software from the author’s website here : http://www.trapkit.de/books/bhd/en.html#videos -
January 11, 2012 at 5:09 am #44952
Tseug
ParticipantI haven’t really checked this book out, but I noticed it on Nostarch’s website when I was looking into Gray Hat Python….
I really like that these guys give you the ebook without charging anything extra when you buy the hard copy book from them…
They have the Metasploit book by Dave Kennedy too, but we already have that in the work “library”….so no need to buy it again….
You reviewers should put pressure on other publishers to adopt the same policy imo.. 😉
-
-
AuthorPosts
- You must be logged in to reply to this topic.