12.07.2015 Views

Bug Hunter Diary

Bug Hunter Diary

Bug Hunter Diary

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

COMRaider, 72coordinated disclosure, 18Core Audio (Apple iOS audioframework), 134cross-site scripting (XSS), 75CTL_CODE, 97CurrentStackLocation, 95CVE-IDs. See Common Vulnerabilitiesand ExposuresIdentifiersCygwin environment, 21DData Execution Prevention(DEP), 19–21, 179–182data transfer type, 97debuggers, 6The GNU Debugger (gdb),7, 121, 140, 171–176Immunity Debugger, 7, 16The Modular Debugger(mdb), 7, 37, 163–165OllyDbg, 7WinDbg, 7, 76–77, 92–95, 99,107, 165–170demuxer, 10, 52DEP (Data Execution Prevention),19–21, 179–182DeviceIoControl(), 90Direct Kernel Object Manipulation(DKOM), 110disassemblers, 7DispCallFunc(), 76DKOM (Direct Kernel ObjectManipulation), 110double frees, 6DRIVER_OBJECT, 90DriverView, 88dynamic analysis, 4EELF (Executable and LinkableFormat), 61, 157Enhanced Mitigation ExperienceToolkit (EMET), 22Executable and Linkable Format(ELF), 61, 157exploit, 3for avast! antivirus productvulnerability, 110development of, 8for FFmpeg vulnerability, 65for Mac OS X kernel vulnerability,129for Sun Solaris kernel vulnerability,48for VLC media player vulnerability,18for WebEx vulnerability, 83FFFmpeg multimedia library,51, 155FreeBSD, 130full disclosure, 18, 84fuzzing, 4, 134Ggdb (The GNU Debugger), 7,121, 140, 171–176Global Offset Table (GOT), 61,67, 157, 183GNU Debugger, The (gdb), 7,121, 140, 171–176GOT overwrite, 67, 157–161/GS, 19, 152, 179–182Hheap buffer overflows, 149. Seealso buffer overflowsheap-memory management, 6heap mitigation techniques, 179heap spraying techniques, 83, 129IIDA Pro (Interactive DisassemblerProfessional), 7, 78,88, 181Immunity Debugger, 7, 16192 Index

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!