Vulnerability Development mailing list archives
Re: Techniques for Vulneability discovery
From: Rafael Anschau <rhanscha () terra com br>
Date: Tue, 09 Apr 2002 12:21:32 -0300
Vulnerability theory is not solid enough to be called a science. It's really an art. There are patterns which can be used to look for them. The best categorization of vulnerabilities I've read is by far Knight's Computer vulnerabilities. For more detail on condition validation errors and synchronization errors see Aslam papers. []'s Woody
Hi, After reading the mailing list for quite a while, there is a burning question which I kept asking myself: How do experts discover vulnerabilities in a system/software? Some categories of vulnerabilities that I am aware of: 1) Buffer overflow (Stack or Heap) 2) Mal access control and Trust management 3) Cross site scripting 4) Unexpected input - e.g. SQL injection? 5) Race conditions 6) password authentication Do people just run scripts to brute force to find vulnerabilities? (as in the case of Buffer overflows) Or do they do a reverse engineer of the software? How relevant is reverse engineering in this context? Anybody out there care to give a methodology/strategy in finding vulnerabilities? Mike _________________________________________________________ Do You Yahoo!? Get your free @yahoo.com address at http://mail.yahoo.com
-- Rafael Anschau - Terra Networks Brasil Operacao Nacional - (51) 3284 4246
Current thread:
- Re[2]: Techniques for Vulnerability discovery, (continued)
- Re[2]: Techniques for Vulnerability discovery dullien (Apr 06)
- RE: Techniques for Vulnerability discovery Leon (Apr 08)
- Re: Techniques for Vulneability discovery Florian Hobelsberger / BlueScreen (Apr 05)
- Re: Techniques for Vulneability discovery Josha Bronson (Apr 05)
- Re: Techniques for Vulneability discovery LS (Apr 05)
- RE: Techniques for Vulneability discovery Pedro Hugo (Apr 05)
- Re: RE: Techniques for Vulneability discovery LS (Apr 08)
- RE: Techniques for Vulneability discovery Pedro Hugo (Apr 05)
- RE: Techniques for Vulneability discovery Marc Maiffret (Apr 05)
- Re: Techniques for Vulneability discovery NoCoNFLiC (Apr 05)
- Re: Techniques for Vulneability discovery 3APA3A (Apr 06)
- Re: Techniques for Vulneability discovery Rafael Anschau (Apr 09)
- Re: Techniques for Vulneability discovery GomoR (Apr 09)
- RE: Techniques for Vulneability discovery David Hawley (Apr 10)
- RE: Techniques for Vulneability discovery Ed Moyle (Apr 05)
- RE: Techniques for Vulneability discovery W. Lee Schexnaider (Apr 05)
- RE: Techniques for Vulneability discovery John Daniele (Apr 07)
- Re: Techniques for Vulneability discovery Ivan Arce (Apr 05)
- RE: Techniques for Vulneability discovery Guillermo Marro (Apr 05)