Vulnerability Development mailing list archives
RE: Techniques for Vulneability discovery
From: "David Hawley" <chiman () hawaiian net>
Date: Tue, 9 Apr 2002 22:46:50 -0700
Well Kai, they do all of the above. Some companies hire an independant Audit team to audit software. Some read bugtraq, incidents, and others wait until they get hacked. :-) David Hawley -----Original Message----- From: kaipower [mailto:kaipower () subdimension com] Sent: Thursday, April 04, 2002 5:05 PM To: security-basics () securityfocus com; vuln-dev () security-focus com; vuln-dev () securityfocus com Subject: Techniques for Vulneability discovery Hi, After reading the mailing list for quite a while, there is a burning question which I kept asking myself: How do experts discover vulnerabilities in a system/software? Some categories of vulnerabilities that I am aware of: 1) Buffer overflow (Stack or Heap) 2) Mal access control and Trust management 3) Cross site scripting 4) Unexpected input - e.g. SQL injection? 5) Race conditions 6) password authentication Do people just run scripts to brute force to find vulnerabilities? (as in the case of Buffer overflows) Or do they do a reverse engineer of the software? How relevant is reverse engineering in this context? Anybody out there care to give a methodology/strategy in finding vulnerabilities? Mike _________________________________________________________ Do You Yahoo!? Get your free @yahoo.com address at http://mail.yahoo.com
Current thread:
- Re: Techniques for Vulneability discovery, (continued)
- Re: Techniques for Vulneability discovery Florian Hobelsberger / BlueScreen (Apr 05)
- Re: Techniques for Vulneability discovery Josha Bronson (Apr 05)
- Re: Techniques for Vulneability discovery LS (Apr 05)
- RE: Techniques for Vulneability discovery Pedro Hugo (Apr 05)
- Re: RE: Techniques for Vulneability discovery LS (Apr 08)
- RE: Techniques for Vulneability discovery Pedro Hugo (Apr 05)
- RE: Techniques for Vulneability discovery Marc Maiffret (Apr 05)
- Re: Techniques for Vulneability discovery NoCoNFLiC (Apr 05)
- Re: Techniques for Vulneability discovery 3APA3A (Apr 06)
- Re: Techniques for Vulneability discovery Rafael Anschau (Apr 09)
- Re: Techniques for Vulneability discovery GomoR (Apr 09)
- RE: Techniques for Vulneability discovery David Hawley (Apr 10)
- RE: Techniques for Vulneability discovery Ed Moyle (Apr 05)
- RE: Techniques for Vulneability discovery W. Lee Schexnaider (Apr 05)
- RE: Techniques for Vulneability discovery John Daniele (Apr 07)
- Re: Techniques for Vulneability discovery Ivan Arce (Apr 05)
- RE: Techniques for Vulneability discovery Guillermo Marro (Apr 05)