Vulnerability research is one of the most effective ways to prevent zero-day attacks, making it a highly sought-after skills set in the cybersecurity realm. This book is designed to help newcomers navigate the intersection of disciplines needed to find unknown security flaws before they can be exploited. In it, author Eugene 'Spaceraccoon' Lim - an award-winning white-hat hacker - presents a comprehensive roadmap of starter strategies in vulnerability research that will enable you to begin hunting zero days right away. Delving into the intricacies of code review, reverse-engineering, fuzzing, and more, Lim guides you step-by-step on how to discover real-world vulnerabilities in the wild. Even experienced researchers can benefit from Lim's insights, expanding their toolkits and discovering new zero days along the way. Learn how to: Strategically select appropriate targets for vulnerability research, Master the art of code review and automate variant analysis, Reverse-engineer software with a focus on discovering vulnerabilities, Bootstrap fuzzing harnesses and analyze crashes, and Develop exploits and proof-of-concepts. From Day Zero to Zero Day is your gateway to mastering vulnerability research - an increasingly critical domain in safeguarding our digital landscape.
Sprache
Verlagsort
Maße
Höhe: 237 mm
Breite: 181 mm
Dicke: 22 mm
Gewicht
ISBN-13
978-1-7185-0394-6 (9781718503946)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Eugene Lim (aka "Spaceraccoon") is a security researcher and white-hat hacker who has reported hundreds of vulnerabilities across enterprise software, hardware, and cloud services. In 2021, he was one of five researchers selected from a pool of over one million for HackerOne's H1 Elite Hall of Fame. His research has been featured at Black Hat and DEF CON and in WIRED and The Register.
Foreword by Jacob Soo
Foreword by Shubham Shah, aka shubs
Introduction
Chapter 0: Day Zero
Chapter 1: Taint Analysis
Chapter 2: Mapping Code to Attack Surface
Chapter 3: Automated Variant Analysis
Chapter 4: Binary Taxonomy
Chapter 5: Source and Sink Discovery
Chapter 6: Hybrid Binary Analysis
Chapter 7: Quick and Dirty Fuzzing
Chapter 8: Coverage-Guided Fuzzing
Chapter 9: Fuzzing Everything
Chapter 10: Beyond Day Zero