Reverse-engineering focused on the detection, and possibly the exploitation, of security vulnerabilities in software and computer systems.
Questions tagged [vulnerability-analysis]
34 questions
10
votes
2 answers
mathematical background behind exploit development and vulnerabilities
I would like more information about the mathematical foundations of vulnerability and exploit development.online sources or books in the right direction will be helpful.
viv
- 784
- 1
- 4
- 17
8
votes
1 answer
What is your vulnerability discovery process?
I myself am a static analysis guy; I mostly gave up dynamic reverse engineering ten years ago. So these days, my process is usually to locate where my input enters the module that I am interested in, and then perform heavy static analysis to…
Rolf Rolles
- 9,198
- 1
- 23
- 33
0
votes
0 answers
What are the best ways today in order to learn about finding use-after-frees while code auditing?
I'm a novice CTF player with a decent understanding of OS internals and software mechanisms, I have deep understanding of heap and OS and User locking mechanims.
I would like to learn on how to properly identify use-after-frees in source codes. The…
nvplyr
- 1
-2
votes
1 answer
What kind of fuzzer can i use?
I studied reverse engineering for 6 months.
And I wanna discover Adobe Reader vulnerability for bughunting.
But i have lack knowlege of this branch. Anyone help me plz?
My question is what kind of fuzzer can i use to fuzzing Adobe Reader?
lotofquestions
- 7
- 2