Industrial-Sized Deals TextBTS15 Shop Women's Handbags Learn more nav_sap_SWP_6M_fly_beacon $5 Albums Fire TV Stick Off to College Essentials Shop Popular Services tmnt tmnt tmnt  Amazon Echo Starting at $99 Kindle Voyage AutoRip in CDs & Vinyl Shop Now Deal of the Day
Digital List Price: $31.95
Kindle Price: $17.25

Save $22.70 (57%)

These promotions will be applied to this item:

Some promotions may be combined; others are not eligible to be combined with other offers. For details, please see the Terms & Conditions associated with these promotions.

Deliver to your Kindle or other device

Deliver to your Kindle or other device

Flip to back Flip to front
Audible Narration Playing... Paused   You are listening to a sample of the Audible narration for this Kindle book.
Learn more

A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security Kindle Edition

29 customer reviews

See all 2 formats and editions Hide other formats and editions
Amazon Price New from Used from
"Please retry"

Length: 208 pages

Best Books of the Month
Best Books of the Month
Want to know our Editors' picks for the best books of the month? Browse Best Books of the Month, featuring our favorite new books in more than a dozen categories.

Editorial Reviews

About the Author

Tobias Klein is a security researcher and founder of NESO Security Labs, an information security consulting and research company based in Heilbronn, Germany. As a vulnerability researcher, Tobias has identified and helped to fix numerous security vulnerabilities. He is the author of two other information security books published in German by dpunkt.verlag of Heidelberg, Germany.

Product Details

  • File Size: 2415 KB
  • Print Length: 208 pages
  • Simultaneous Device Usage: Unlimited
  • Publisher: No Starch Press; 1 edition (November 4, 2011)
  • Publication Date: November 4, 2011
  • Sold by: Amazon Digital Services, Inc.
  • Language: English
  • ASIN: B00652XO2I
  • Text-to-Speech: Enabled
  • X-Ray:
  • Word Wise: Not Enabled
  • Lending: Not Enabled
  • Enhanced Typesetting: Not Enabled
  • Amazon Best Sellers Rank: #236,384 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
  •  Would you like to give feedback on images?

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

5 star
4 star
3 star
2 star
1 star
See all 29 customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

14 of 14 people found the following review helpful By Happy Cat on November 8, 2011
Format: Paperback
This was a great read; short and focused. While it did not have as much variety as other books, such as The Art Of Software Security Assessment, Bug Hunter's Diary had little or no fluff and was filled with valuable content.

In each chapter, the author did a great job walking through identifying the vulnerability, and explaining the thought process in a digestible, straightforward manner. The brief enumeration of possible disclosure routes was also worded well to concisely explain why a bug hunter might pursue each avenue. Lastly, it was good to see the author track the remediating patch and identify the resulting vulnerabilities.

Tobias Klein is very thorough and detailed in his discovery of vulnerabilities, but in a concise manner. He sticks right to the point and keeps on track for honing in on vulnerable code and triggering said code with the proper conditions and data.

It was also amusing to compare differences in the disclosure timelines from chapter to chapter. Independent, open source targets were patched much more quickly than their counterparts that were fostered by larger organizations. It is uncertain as to whether this was an intentional observation, but interesting none-the-less.

This is a short, fun read for anyone who is interested in vulnerability analysis and exploit development.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
9 of 9 people found the following review helpful By Gregory Zentkovich on November 17, 2011
Format: Paperback
There is a wealth of knowledge being passed in this easy to follow along book. Although some of the content (i.e. the source code), might seem cryptic at first, Tobias does an excellent job of going out of his way to making it understandable. In one instance, he was breaking down some assembly code and used pseudo c code to make it more understandable, and almost as if he could see my eyes still glazing over, he simplifies even further with pseudo code that was language-neutral (basically english), and then the light bulb went on. I was amazed at what I was learning. I also liked the fact that I did not have to concern myself or be distracted from the process because I did not understand some code, and that was huge. In addition, he has a lot of great visual diagrams, side notes, links to source code and the tools used, references for further study, basically the whole shebang. Simply put, Tobias made my first journey into the world of bug hunting an exciting one. I would highly recommend this to anyone who wants to better their programming skills, get into computer security research or just plain understand how software works this book will get you jump started and excited!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
8 of 8 people found the following review helpful By Stephen Chapman on November 29, 2011
Format: Paperback
A read of this book may change your view of computer software forever. The real world security holes that it discusses were found in extremely popular software on a variety of different platforms and clearly represent only a few samples of such holes that are common across most software.

While a fairly advanced level of programming knowledge both with high level languages such as C++ and also with low level assembly language is required to be able to fully understand just exactly how everything described in the book works, it isn't necessary to have that in depth knowledge in order to gain some benefit. Since the purpose of each code change is described in detail in the book those without such an in depth programming knowledge can simply take the author's word for it that a given code change will have a particular result and will still be able to gain a greater understanding of just how vulnerable software can be. These are after all real vulnerabilities that the author found in common software that have since been patched. So as well as demonstrating some of the ways in which holes can be found and exploited the author also demonstrates how he has contributed to helping the owners of this software to patch some of the holes in their software and so make the software safer to use.

Perhaps the things that most stand out about software security from this book are first of all just how easily some security holes can be found by someone who has sufficient experience in "bug hunting" and second, just how small a code change is needed in many instances in order to fix these security holes.

In the front of the book the author describes the goals that he had in writing the book and the book definitely achieves those goals.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 3 people found the following review helpful By Nagareshwar Talekar on December 22, 2011
Format: Paperback
Once upon a time there were bounty hunters running in the wild to nab those `Most Wanted' criminals and walk away with big bucks. Now we have bug hunters running wild in their computer world not only to put their name on wall of fame but also to reap those rich rewards.

Here in this latest book "Bug Hunter's Diary" we have similar story of another great and inspiring bug hunter, Tobias Klein.

This book gives valuable insights on different techniques of bug hunting and exploiting them successfully. Each of the chapters in this book conforms to the each of the vulnerability discovered by author and written in his own words and style.

Before you proceed to reading, it is good idea to get some basic knowledge on driver concepts including its life cycle, IRP, IOCTL and debugging. As three of eight chapters here deal with driver bugs, this prep will help you to feel at home later on.

If you are new to vulnerability research, I suggest you to start with Appendix A which refreshes concept of stack overflow with practical example, NULL pointer dereferences, type conversion, GOT exploitation techniques which are essential to understand main chapters. Appendix B describes debugging tools along with commands for Solaris(mdb), Linux (gdb), Windows (windbg) and shows how to setup VMware for Kernel Debugging. Final Appendix talks about exploit mitigation techniques such as ASLR, GS, NX, DEP and finishes with detailed description on RELRO for ELF (Linux).

Though fuzzing is most common method used for bug hunting these days, author has used it only in final chapter and rest of the bugs were based on manual & his ingenious approach, that's what separates men from boys.

In chap 2, author talks about the first victim, VLC media player.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Most Recent Customer Reviews


There are no discussions about this product yet.
Be the first to discuss this product with the community.
Start a new discussion
First post:
Prompts for sign-in