• XSS.stack #1 – первый литературный журнал от юзеров форума

Мануал/Книга Литература и документация по исследованию уязвимостей

Пожалуйста, обратите внимание, что пользователь заблокирован
Fuzzing Against the Machine: Automate vulnerability research with emulated IoT devices on QEMU

1685103626148.png


desc book
Emulation and fuzzing are among the many techniques that can be used to improve cybersecurity; however, utilizing these efficiently can be tricky. Fuzzing Against the Machine is your hands-on guide to understanding how these powerful tools and techniques work. Using a variety of real-world use cases and practical examples, this book helps you grasp the fundamental concepts of fuzzing and emulation along with advanced vulnerability research, providing you with the tools and skills needed to find security flaws in your software.

The book begins by introducing you to two open source fuzzer engines: QEMU, which allows you to run software for whatever architecture you can think of, and American fuzzy lop (AFL) and its improved version AFL++. You'll learn to combine these powerful tools to create your own emulation and fuzzing environment and then use it to discover vulnerabilities in various systems, such as iOS, Android, and Samsung's Mobile Baseband software, Shannon. After reading the introductions and setting up your environment, you'll be able to dive into whichever chapter you want, although the topics gradually become more advanced as the book progresses.

By the end of this book, you'll have gained the skills, knowledge, and practice required to find flaws in any firmware by emulating and fuzzing it with QEMU and several fuzzing engines.

Сорцы

Скачать можно так же на меге.
 
Beginner's Guide to Exploitation on ARM

Посмотреть вложение 30165

Это книга для начинающих, предназначенная для людей заинтересованных в изучении основных концепций анализа уязвимостей программного обеспечения и разработки эксплойтов (ARM).

Скрытое содержимое
А первого тома у Вас не найдется?
 
Пожалуйста, обратите внимание, что пользователь заблокирован
А первого тома у Вас не найдется?
Увы... Это единственное что в паблике было.
 
1744443372803.png

From Day Zero to Zero Day

Vulnerability research is one of the most effective ways to prevent zero-day attacks, making it a highly sought-after skills set in the cybersecurity realm. This book is designed to help newcomers navigate the intersection of disciplines needed to find unknown security flaws before they can be exploited. In it, author Eugene “Spaceraccoon” Lim—an award-winning white-hat hacker—presents a comprehensive roadmap of starter strategies in vulnerability research that will enable you to begin hunting zero days right away. Delving into the intricacies of code review, reverse-engineering, fuzzing, and more, Lim guides you step-by-step on how to discover real-world vulnerabilities in the wild. Even experienced researchers can benefit from Lim’s insights, expanding their toolkits and discovering new zero days along the way.

Learn how to:
  • Strategically select appropriate targets for vulnerability research
  • Master the art of code review and automate variant analysis
  • Reverse-engineer software with a focus on discovering vulnerabilities
  • Bootstrap fuzzing harnesses and analyze crashes
  • Develop exploits and proof-of-concepts
  • Publisher ‏ : ‎ No Starch Press (August 12, 2025)
  • Language ‏ : ‎ English
Download :
http://**************************************************************/d/3bvF5UoNR69Y3ts8sy4OOY
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх