Questions tagged [vulnerability-analysis]

Reverse-engineering focused on the detection, and possibly the exploitation, of security vulnerabilities in software and computer systems.

34 questions
10
votes
2 answers

mathematical background behind exploit development and vulnerabilities

I would like more information about the mathematical foundations of vulnerability and exploit development.online sources or books in the right direction will be helpful.
viv
  • 784
  • 1
  • 4
  • 17
8
votes
1 answer

What is your vulnerability discovery process?

I myself am a static analysis guy; I mostly gave up dynamic reverse engineering ten years ago. So these days, my process is usually to locate where my input enters the module that I am interested in, and then perform heavy static analysis to…
Rolf Rolles
  • 9,198
  • 1
  • 23
  • 33
0
votes
0 answers

What are the best ways today in order to learn about finding use-after-frees while code auditing?

I'm a novice CTF player with a decent understanding of OS internals and software mechanisms, I have deep understanding of heap and OS and User locking mechanims. I would like to learn on how to properly identify use-after-frees in source codes. The…
nvplyr
  • 1
-2
votes
1 answer

What kind of fuzzer can i use?

I studied reverse engineering for 6 months. And I wanna discover Adobe Reader vulnerability for bughunting. But i have lack knowlege of this branch. Anyone help me plz? My question is what kind of fuzzer can i use to fuzzing Adobe Reader?