Dekorationsartikel gehören nicht zum Leistungsumfang.
Sprache:
Englisch
43,35 €*
Versandkostenfrei per Post / DHL
Lieferzeit 1-2 Wochen
Kategorien:
Beschreibung
Seemingly simple bugs can have drastic consequences, allowing attackers to compromise systems, escalate local privileges, and otherwise wreak havoc on a system.
A Bug Hunter's Diary follows security expert Tobias Klein as he tracks down and exploits bugs in some of the world's most popular software, like Apple's iOS, the VLC media player, web browsers, and even the Mac OS X kernel. In this one-of-a-kind account, you'll see how the developers responsible for these flaws patched the bugs-or failed to respond at all. As you follow Klein on his journey, you'll gain deep technical knowledge and insight into how hackers approach difficult problems and experience the true joys (and frustrations) of bug hunting.
Along the way you'll learn how to:
Use field-tested techniques to find bugs, like identifying and tracing user input data and reverse engineering
Exploit vulnerabilities like NULL pointer dereferences, buffer overflows, and type conversion flaws
Develop proof of concept code that verifies the security flaw
Report bugs to vendors or third party brokers
A Bug Hunter's Diary is packed with real-world examples of vulnerable code and the custom programs used to find and test bugs. Whether you're hunting bugs for fun, for profit, or to make the world a safer place, you'll learn valuable new skills by looking over the shoulder of a professional bug hunter in action.
A Bug Hunter's Diary follows security expert Tobias Klein as he tracks down and exploits bugs in some of the world's most popular software, like Apple's iOS, the VLC media player, web browsers, and even the Mac OS X kernel. In this one-of-a-kind account, you'll see how the developers responsible for these flaws patched the bugs-or failed to respond at all. As you follow Klein on his journey, you'll gain deep technical knowledge and insight into how hackers approach difficult problems and experience the true joys (and frustrations) of bug hunting.
Along the way you'll learn how to:
Use field-tested techniques to find bugs, like identifying and tracing user input data and reverse engineering
Exploit vulnerabilities like NULL pointer dereferences, buffer overflows, and type conversion flaws
Develop proof of concept code that verifies the security flaw
Report bugs to vendors or third party brokers
A Bug Hunter's Diary is packed with real-world examples of vulnerable code and the custom programs used to find and test bugs. Whether you're hunting bugs for fun, for profit, or to make the world a safer place, you'll learn valuable new skills by looking over the shoulder of a professional bug hunter in action.
Seemingly simple bugs can have drastic consequences, allowing attackers to compromise systems, escalate local privileges, and otherwise wreak havoc on a system.
A Bug Hunter's Diary follows security expert Tobias Klein as he tracks down and exploits bugs in some of the world's most popular software, like Apple's iOS, the VLC media player, web browsers, and even the Mac OS X kernel. In this one-of-a-kind account, you'll see how the developers responsible for these flaws patched the bugs-or failed to respond at all. As you follow Klein on his journey, you'll gain deep technical knowledge and insight into how hackers approach difficult problems and experience the true joys (and frustrations) of bug hunting.
Along the way you'll learn how to:
Use field-tested techniques to find bugs, like identifying and tracing user input data and reverse engineering
Exploit vulnerabilities like NULL pointer dereferences, buffer overflows, and type conversion flaws
Develop proof of concept code that verifies the security flaw
Report bugs to vendors or third party brokers
A Bug Hunter's Diary is packed with real-world examples of vulnerable code and the custom programs used to find and test bugs. Whether you're hunting bugs for fun, for profit, or to make the world a safer place, you'll learn valuable new skills by looking over the shoulder of a professional bug hunter in action.
A Bug Hunter's Diary follows security expert Tobias Klein as he tracks down and exploits bugs in some of the world's most popular software, like Apple's iOS, the VLC media player, web browsers, and even the Mac OS X kernel. In this one-of-a-kind account, you'll see how the developers responsible for these flaws patched the bugs-or failed to respond at all. As you follow Klein on his journey, you'll gain deep technical knowledge and insight into how hackers approach difficult problems and experience the true joys (and frustrations) of bug hunting.
Along the way you'll learn how to:
Use field-tested techniques to find bugs, like identifying and tracing user input data and reverse engineering
Exploit vulnerabilities like NULL pointer dereferences, buffer overflows, and type conversion flaws
Develop proof of concept code that verifies the security flaw
Report bugs to vendors or third party brokers
A Bug Hunter's Diary is packed with real-world examples of vulnerable code and the custom programs used to find and test bugs. Whether you're hunting bugs for fun, for profit, or to make the world a safer place, you'll learn valuable new skills by looking over the shoulder of a professional bug hunter in action.
Über den Autor
Tobias Klein is a security researcher and founder of NESO Security Labs, an information security consulting and research company based in Heilbronn, Germany. He is the author of two information security books published in German by dpunkt.verlag of Heidelberg, Germany.
Zusammenfassung
A thrilling, behind-the-scenes look at finding, exploiting, and fixing software security vulnerabilities.
- Shows real vulnerabilities that affect millions of users
- Targets a wide range of operating systems and software
- Information security is a lucrative, rapidly growing field
- Author is a well-established information security expert
- Shows real vulnerabilities that affect millions of users
- Targets a wide range of operating systems and software
- Information security is a lucrative, rapidly growing field
- Author is a well-established information security expert
Inhaltsverzeichnis
Acknowledgments
Introduction
Chapter 1: Bug Hunting
Chapter 2: Back to the 90s
Chapter 3: Escape from the WWW Zone
Chapter 4: NULL Pointer FTW
Chapter 5: Browse and You're Owned
Chapter 6: One Kernel to Rule Them All
Chapter 7: A Bug Older Than 4.4BSD
Chapter 8: The Ringtone Massacre
Appendix A: Hints for Hunting
Appendix B: Debugging
Appendix C: Mitigation
Index
Introduction
Chapter 1: Bug Hunting
Chapter 2: Back to the 90s
Chapter 3: Escape from the WWW Zone
Chapter 4: NULL Pointer FTW
Chapter 5: Browse and You're Owned
Chapter 6: One Kernel to Rule Them All
Chapter 7: A Bug Older Than 4.4BSD
Chapter 8: The Ringtone Massacre
Appendix A: Hints for Hunting
Appendix B: Debugging
Appendix C: Mitigation
Index
Details
Erscheinungsjahr: | 2011 |
---|---|
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: |
XII
195 S. |
ISBN-13: | 9781593273859 |
ISBN-10: | 1593273851 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: | Klein, Tobias |
Hersteller: | No Starch Press |
Verantwortliche Person für die EU: | Petersen Buchimport GmbH, Vertrieb, Weidestr. 122a, D-22083 Hamburg, gpsr@petersen-buchimport.com |
Maße: | 229 x 152 x 12 mm |
Von/Mit: | Tobias Klein |
Erscheinungsdatum: | 11.10.2011 |
Gewicht: | 0,309 kg |
Über den Autor
Tobias Klein is a security researcher and founder of NESO Security Labs, an information security consulting and research company based in Heilbronn, Germany. He is the author of two information security books published in German by dpunkt.verlag of Heidelberg, Germany.
Zusammenfassung
A thrilling, behind-the-scenes look at finding, exploiting, and fixing software security vulnerabilities.
- Shows real vulnerabilities that affect millions of users
- Targets a wide range of operating systems and software
- Information security is a lucrative, rapidly growing field
- Author is a well-established information security expert
- Shows real vulnerabilities that affect millions of users
- Targets a wide range of operating systems and software
- Information security is a lucrative, rapidly growing field
- Author is a well-established information security expert
Inhaltsverzeichnis
Acknowledgments
Introduction
Chapter 1: Bug Hunting
Chapter 2: Back to the 90s
Chapter 3: Escape from the WWW Zone
Chapter 4: NULL Pointer FTW
Chapter 5: Browse and You're Owned
Chapter 6: One Kernel to Rule Them All
Chapter 7: A Bug Older Than 4.4BSD
Chapter 8: The Ringtone Massacre
Appendix A: Hints for Hunting
Appendix B: Debugging
Appendix C: Mitigation
Index
Introduction
Chapter 1: Bug Hunting
Chapter 2: Back to the 90s
Chapter 3: Escape from the WWW Zone
Chapter 4: NULL Pointer FTW
Chapter 5: Browse and You're Owned
Chapter 6: One Kernel to Rule Them All
Chapter 7: A Bug Older Than 4.4BSD
Chapter 8: The Ringtone Massacre
Appendix A: Hints for Hunting
Appendix B: Debugging
Appendix C: Mitigation
Index
Details
Erscheinungsjahr: | 2011 |
---|---|
Genre: | Importe, Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: |
XII
195 S. |
ISBN-13: | 9781593273859 |
ISBN-10: | 1593273851 |
Sprache: | Englisch |
Einband: | Kartoniert / Broschiert |
Autor: | Klein, Tobias |
Hersteller: | No Starch Press |
Verantwortliche Person für die EU: | Petersen Buchimport GmbH, Vertrieb, Weidestr. 122a, D-22083 Hamburg, gpsr@petersen-buchimport.com |
Maße: | 229 x 152 x 12 mm |
Von/Mit: | Tobias Klein |
Erscheinungsdatum: | 11.10.2011 |
Gewicht: | 0,309 kg |
Sicherheitshinweis