Programming Books C Java PHP Python Learn more Browse Programming Books
A Bug Hunter's Diary and over one million other books are available for Amazon Kindle. Learn more
Buy New
$28.19
Qty:1
  • List Price: $39.95
  • Save: $11.76 (29%)
FREE Shipping on orders over $35.
Only 9 left in stock (more on the way).
Ships from and sold by Amazon.com.
Gift-wrap available.
Add to Cart
Trade in your item
Get a $4.81
Gift Card.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security Paperback – November 14, 2011

ISBN-13: 978-1593273859 ISBN-10: 1593273851 Edition: 1st

Buy New
Price: $28.19
57 New from $13.00 38 Used from $13.05
Amazon Price New from Used from
eTextbook
"Please retry"
Paperback
"Please retry"
$28.19
$13.00 $13.05

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student



Frequently Bought Together

A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security + The Tangled Web: A Guide to Securing Modern Web Applications
Price for both: $62.18

Buy the selected items together

NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Paperback: 208 pages
  • Publisher: No Starch Press; 1 edition (November 14, 2011)
  • Language: English
  • ISBN-10: 1593273851
  • ISBN-13: 978-1593273859
  • Product Dimensions: 9 x 6.3 x 0.7 inches
  • Shipping Weight: 11.2 ounces (View shipping rates and policies)
  • Average Customer Review: 4.6 out of 5 stars  See all reviews (26 customer reviews)
  • Amazon Best Sellers Rank: #219,478 in Books (See Top 100 in Books)

Editorial Reviews

About the Author

Tobias Klein is a security researcher and founder of NESO Security Labs, an information security consulting and research company based in Heilbronn, Germany. As a vulnerability researcher, Tobias has identified and helped to fix numerous security vulnerabilities. He is the author of two other information security books published in German by dpunkt.verlag of Heidelberg, Germany.


More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

4.6 out of 5 stars
5 star
16
4 star
10
3 star
0
2 star
0
1 star
0
See all 26 customer reviews
I read this book after reading TAOSSA and was very impressed.
moshe k
In a Bug Hunter's Diary, Tobias Klein goes into great depth on each entry and provides an inside look into the detection, analysis, and exploitation of each bug found.
Devon Kearns (dookie)
It is an arcane and technical work, assuming the reader to have programming knowledge of C and assembly language.
Amazon Customer

Most Helpful Customer Reviews

14 of 14 people found the following review helpful By Happy Cat on November 8, 2011
Format: Paperback
This was a great read; short and focused. While it did not have as much variety as other books, such as The Art Of Software Security Assessment, Bug Hunter's Diary had little or no fluff and was filled with valuable content.

In each chapter, the author did a great job walking through identifying the vulnerability, and explaining the thought process in a digestible, straightforward manner. The brief enumeration of possible disclosure routes was also worded well to concisely explain why a bug hunter might pursue each avenue. Lastly, it was good to see the author track the remediating patch and identify the resulting vulnerabilities.

Tobias Klein is very thorough and detailed in his discovery of vulnerabilities, but in a concise manner. He sticks right to the point and keeps on track for honing in on vulnerable code and triggering said code with the proper conditions and data.

It was also amusing to compare differences in the disclosure timelines from chapter to chapter. Independent, open source targets were patched much more quickly than their counterparts that were fostered by larger organizations. It is uncertain as to whether this was an intentional observation, but interesting none-the-less.

This is a short, fun read for anyone who is interested in vulnerability analysis and exploit development.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
8 of 8 people found the following review helpful By Stephen Chapman on November 29, 2011
Format: Paperback
A read of this book may change your view of computer software forever. The real world security holes that it discusses were found in extremely popular software on a variety of different platforms and clearly represent only a few samples of such holes that are common across most software.

While a fairly advanced level of programming knowledge both with high level languages such as C++ and also with low level assembly language is required to be able to fully understand just exactly how everything described in the book works, it isn't necessary to have that in depth knowledge in order to gain some benefit. Since the purpose of each code change is described in detail in the book those without such an in depth programming knowledge can simply take the author's word for it that a given code change will have a particular result and will still be able to gain a greater understanding of just how vulnerable software can be. These are after all real vulnerabilities that the author found in common software that have since been patched. So as well as demonstrating some of the ways in which holes can be found and exploited the author also demonstrates how he has contributed to helping the owners of this software to patch some of the holes in their software and so make the software safer to use.

Perhaps the things that most stand out about software security from this book are first of all just how easily some security holes can be found by someone who has sufficient experience in "bug hunting" and second, just how small a code change is needed in many instances in order to fix these security holes.

In the front of the book the author describes the goals that he had in writing the book and the book definitely achieves those goals.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
8 of 8 people found the following review helpful By Gregory Zentkovich on November 17, 2011
Format: Paperback
There is a wealth of knowledge being passed in this easy to follow along book. Although some of the content (i.e. the source code), might seem cryptic at first, Tobias does an excellent job of going out of his way to making it understandable. In one instance, he was breaking down some assembly code and used pseudo c code to make it more understandable, and almost as if he could see my eyes still glazing over, he simplifies even further with pseudo code that was language-neutral (basically english), and then the light bulb went on. I was amazed at what I was learning. I also liked the fact that I did not have to concern myself or be distracted from the process because I did not understand some code, and that was huge. In addition, he has a lot of great visual diagrams, side notes, links to source code and the tools used, references for further study, basically the whole shebang. Simply put, Tobias made my first journey into the world of bug hunting an exciting one. I would highly recommend this to anyone who wants to better their programming skills, get into computer security research or just plain understand how software works this book will get you jump started and excited!
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 3 people found the following review helpful By Nagareshwar Talekar on December 22, 2011
Format: Paperback
Once upon a time there were bounty hunters running in the wild to nab those `Most Wanted' criminals and walk away with big bucks. Now we have bug hunters running wild in their computer world not only to put their name on wall of fame but also to reap those rich rewards.

Here in this latest book "Bug Hunter's Diary" we have similar story of another great and inspiring bug hunter, Tobias Klein.

This book gives valuable insights on different techniques of bug hunting and exploiting them successfully. Each of the chapters in this book conforms to the each of the vulnerability discovered by author and written in his own words and style.

Before you proceed to reading, it is good idea to get some basic knowledge on driver concepts including its life cycle, IRP, IOCTL and debugging. As three of eight chapters here deal with driver bugs, this prep will help you to feel at home later on.

If you are new to vulnerability research, I suggest you to start with Appendix A which refreshes concept of stack overflow with practical example, NULL pointer dereferences, type conversion, GOT exploitation techniques which are essential to understand main chapters. Appendix B describes debugging tools along with commands for Solaris(mdb), Linux (gdb), Windows (windbg) and shows how to setup VMware for Kernel Debugging. Final Appendix talks about exploit mitigation techniques such as ASLR, GS, NX, DEP and finishes with detailed description on RELRO for ELF (Linux).

Though fuzzing is most common method used for bug hunting these days, author has used it only in final chapter and rest of the bugs were based on manual & his ingenious approach, that's what separates men from boys.

In chap 2, author talks about the first victim, VLC media player.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Customer Images

Most Recent Customer Reviews

Search