Penetration Testing mailing list archives
Re: Source code auditing
From: Oliver Kindernay <oliver.kindernay () gmail com>
Date: Tue, 16 Feb 2010 17:01:31 +0100
2010/2/15 Yasser Al-Ruhaili <yasser.alruhaily () gmail com>:
Hi, I think OWASP Code Review book is a good starting point for source code review. http://www.lulu.com/items/volume_64/5678000/5678680/13/print/5678680.pdf for complete list of OWASP books: http://stores.lulu.com/owasp
Thanks, I'll check it. Sorry, I have sent you this email twice. 2010/2/15 <danuxx () gmail com>:
I think she was not talking about the power of metasploit (which no doubt is poweful and magic!!) but the easy-to-use interface to exploit vulnerable systems. So that script kiddies do not need to know what EIP or Pop+Pop+Ret means in order to compromise a system. My 2 rupees :-)
I was not talking about exploit vulnerabities, but about DISCOVERING it in source code. Something what can make it easier. 2010/2/16 M.D.Mufambisi, CISSP <mufambisi () gmail com>:
Hi Oliver, I hope you are well. I do not have an answer to your question....but i want to ask you something regarding what you wrote. I want to learn how to develop exploits in linux such as the ones you mentioned that you have had experience with. What do i need to read to be able to understand that? Any materials you advise i should read to able to write buffer overflow exploits? Your help wioll be greatly appreciated. Regards
There are tons of articels on the internet (for example milw0rm.com), and also great books (specially John Erickson - the art of exploitation). For some practice you can try some levels in pretty good wargame http://io.smashthestack.org:84/ (there is also irc channel where yo can get some help). Of course, you must have some skills (C, x86 basics (when you want to write exploits for x86 architectures, probably you want it), ..) 2010/2/15 <danuxx () gmail com>:
I think she was not talking about the power of metasploit (which no doubt is poweful and magic!!) but the easy-to-use interface to exploit vulnerable systems. So that script kiddies do not need to know what EIP or Pop+Pop+Ret means in order to compromise a system. My 2 rupees :-) ------Original Message------ From: Oliver Kindernay Sender: listbounce () securityfocus com To: pen-test () securityfocus com Subject: Source code auditing Sent: Feb 15, 2010 10:53 AM Hi, I am interested in exploiting applications. I have some practice in writing exploits (buffer overflow, format string, ...) in linux. I want to start exploiting real applications (open source). I don't know how to start with finding bugs in application's source. I can use perl, grep, etc... for finding some statical buffers, strcpys, etc. but it's good just for some explorative research. Could you post some sources where can I learn some about source code auditing? ------------------------------------------------------------------------ This list is sponsored by: Information Assurance Certification Review Board Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT and CEPT certs require a full practical examination in order to become certified. http://www.iacertification.org ------------------------------------------------------------------------ Sent via BlackBerry from T-Mobile
------------------------------------------------------------------------ This list is sponsored by: Information Assurance Certification Review Board Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT and CEPT certs require a full practical examination in order to become certified. http://www.iacertification.org ------------------------------------------------------------------------
Current thread:
- Source code auditing Oliver Kindernay (Feb 15)
- Re: Source code auditing Think Defensive (Feb 17)
- Re: Source code auditing Oliver Kindernay (Feb 17)
- Re: Source code auditing Anders Thulin (Feb 17)
- Re: Source code auditing Think Defensive (Feb 17)
- Re: Source code auditing jcran (Feb 17)
- Re: Source code auditing Himanshu Goyal (Feb 22)
- <Possible follow-ups>
- Re: Source code auditing danuxx (Feb 15)
- Re: Source code auditing Oliver Kindernay (Feb 17)
- Re: Source code auditing Zack Payton (Feb 17)
- Re: Source code auditing Oliver Kindernay (Feb 22)
- Re: Source code auditing Oliver Kindernay (Feb 17)
- Re: Source code auditing Think Defensive (Feb 17)
- Re: Re: Source code auditing yasser . alruhaily (Feb 17)