Chapter 18. From Vulnerability to Exploit

  • Determining whether a bug is exploitable

  • Using a debugger efficiently

  • Understanding the exact nature of the problem

  • Preconditions and postconditions for exploitation

  • Repeating the problem reliably

  • Payload construction considerations

  • How to properly document the nature of a vulnerability

Whether you use static analysis, dynamic analysis, or some combination of both to discover a problem with a piece of software, locating a potential problem or causing a program to melt down in the face of a fuzzer onslaught is just the first step. With static analysis in particular you face the task of determining exactly how to reach the vulnerable code while the program is executing. Additional analysis followed by testing ...

Get Gray Hat Hacking, Second Edition, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.