12.07.2015 Views

Bug Hunter Diary

Bug Hunter Diary

Bug Hunter Diary

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

in the following chapters, it means that I’ve gained control of thevulnerable process.Once you achieve control over the instruction pointer, there aremany ways to turn it into a fully working, weaponized exploit. Formore information on the process of exploit development, you canrefer to Jon Erickson’s Hacking: The Art of Exploitation, 2nd edition(No Starch Press, 2008), or you can type exploit writing into Googleand browse through the enormous amount of material availableonline.1.6 Final NoteWe’ve covered a lot of ground in this chapter, and you might be leftwith a lot of questions. Don’t worry—that’s a fine place to be. Thefollowing seven diary chapters delve into more detail on the topicsintroduced here and will answer many of your questions. You can alsoread through the appendixes for background information on varioustopics discussed throughout this book.NoteThe diary chapters are not in chronological order. They’re arrangedaccording to the subject matter so that the concepts build on oneanother.Notes1. See Pedram Amini, “Mostrame la guita! Adventures in Buying Vulnerabilities,”2009, http://docs.google.com/present/view?id=dcc6wpsd_20ghbpjxcr ; CharlieMiller, “The Legitimate Vulnerability Market: Inside the Secretive Worldof 0-day Exploit Sales,” 2007, http://weis2007.econinfosec.org/papers/29.pdf ;iDefense Labs Vulnerability Contribution Program, https://labs.idefense.com/vcpportal/login.html; TippingPoint’s Zero Day Initiative, http://www.zerodayinitiative.com/.2. See Daniel Hodson, “Uninitialized Variables: Finding, Exploiting, Automating”(presentation, Ruxcon, 2008), http://felinemenace.org/~mercy/slides/RUXCON2008-UninitializedVariables.pdf.3. See Common Weakness Enumeration, CWE List, CWE - Individual DictionaryDefinition (2.0), CWE-415: Double Free at http://cwe.mitre.org/data/definitions/415.html .4. See http://www.hex-rays.com/idapro/.5. See Intel ® 64 and IA-32 Architectures Software Developer’s Manual, Volume 1:Basic Architecture at http://www.intel.com/products/processor/manuals/.8 Chapter 1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!