Goodreads helps you keep track of books you want to read.
Start by marking “A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security” as Want to Read:
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
Enlarge cover
Rate this book
Clear rating
Open Preview

A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security

3.83  ·  Rating Details ·  138 Ratings  ·  7 Reviews
"This is one of the most interesting infosec books to come out in the last several years."
–Dino Dai Zovi, Information Security Professional

"Give a man an exploit and you make him a hacker for a day; teach a man to exploit bugs and you make him a hacker for a lifetime."
–Felix 'FX' Lindner

Seemingly simple bugs can have drastic consequences, allowing attackers to compromise s
...more
Paperback, 208 pages
Published November 11th 2011 by No Starch Press (first published October 22nd 2011)
More Details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about A Bug Hunter's Diary, please sign up.

Be the first to ask a question about A Bug Hunter's Diary

Community Reviews

(showing 1-30)
filter  |  sort: default (?)  |  Rating Details
javier
Apr 09, 2012 javier rated it liked it
This book is a good read as far as technical books go, however it has something lacking. It feels as though more time could be spent analyzing closed source programs rather than the examples chosen: VLC, Solaris, etc.

Thy said, the presentation is great. Each example has a very clear approach and methodology.

If you are new to bug hunting, or want to get a taste of what bug hunting is about, this book is for you. If you are a seasoned veteran of bugs, your time is probably better spent developin
...more
Hugh Smalley
Sep 14, 2016 Hugh Smalley rated it liked it

"Give a man an exploit and you make him a hacker for a day; teach a man to exploit bugs and you make him a hacker for a lifetime."

–Felix 'FX' Lindner

\n

A Bug Hunter's Diary follows security expert Tobias Klein as he tracks down and exploits bugs in some of the world's most popular software.



"This is one of the most interesting infosec books to come out in the last several years."
**–Dino Dai Zovi, Information Security Professional**


"Give a man an exploit and you make him a hacker for a day; teach

...more
Julio Biason
Oct 15, 2016 Julio Biason rated it really liked it
Shelves: kindle, it
For a long time you keep hearing things like "don't use this 'cause it can be exploited", but you really never saw something like that being exploited. And then comes this book and shows how someone can use everything you know you can't use to actually call something it wasn't expected to be called.

Confusing? Well, it's a very complex issue that involves the call stack and assembly and registers and all that. But the book goes into length explaining and showing those things (so, yeah, some know
...more
Ayoub
Oct 04, 2015 Ayoub rated it it was ok
gives you an insight into how the finest of reverse engineering think and process those bugs, most importantly coding the exploit. Brief but not concise, Tobias claims that the reason is due to the cyber law in germany.
Andy Parkes
Aug 03, 2016 Andy Parkes rated it it was ok
Shelves: 2016-reading
Giving two stars purely based on my own experience with this. I'm clearly not target audience for this. An interesting read but way past my level of technical competence to fully understand it.
J. Alberto
Aug 19, 2016 J. Alberto rated it liked it
Not for everyone... very interesting
عَبدُالكَرِيمْ
I absolutely loved this book!
It clears much of the magic behind those elite hackers and how they discover high profile vulns
Mesut
Mesut rated it really liked it
Aug 09, 2013
mm
mm rated it it was amazing
Feb 01, 2014
Zazkia
Zazkia rated it really liked it
Dec 16, 2015
Eric Gragsone
Eric Gragsone rated it liked it
Mar 08, 2014
Jay
Jay rated it really liked it
Mar 07, 2017
Fatih Erdogan
Fatih Erdogan rated it it was amazing
Feb 27, 2017
Ledio
Ledio rated it really liked it
May 11, 2012
Athanasios
Athanasios rated it liked it
Jan 21, 2016
Jacqueline
Jacqueline rated it really liked it
May 16, 2014
Gábor
Gábor rated it liked it
Aug 10, 2016
Russ
Russ rated it it was amazing
Sep 07, 2014
Gerard
Gerard rated it it was amazing
Mar 25, 2016
Carla
Carla rated it liked it
Dec 31, 2013
Aleksandar Todorović
Aleksandar Todorović rated it really liked it
Oct 26, 2016
Stuart
Stuart rated it really liked it
Aug 29, 2014
Kc
Kc rated it it was amazing
Jan 23, 2014
Rob
Rob rated it it was amazing
Jan 05, 2014
Ivan
Ivan rated it liked it
May 17, 2016
Patrick
Patrick rated it liked it
Aug 05, 2015
Andreas Happe
Andreas Happe rated it really liked it
Nov 02, 2016
Jeremy Allen
Jeremy Allen rated it really liked it
Feb 02, 2015
Mathew Hall
Mathew Hall rated it liked it
Oct 03, 2013
Adarsh Dinesh
Adarsh Dinesh rated it liked it
Nov 05, 2013
« previous 1 3 4 5 next »
There are no discussion topics on this book yet. Be the first to start one »
  • Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
  • Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
  • The Art of Software Security Assessment: Identifying and Avoiding Software Vulnerabilities
  • Hacking the Xbox: An Introduction to Reverse Engineering
  • Windows® Internals, Part 1: Covering Windows Server® 2008 R2 and Windows 7
  • Metasploit: The Penetration Tester's Guide
  • Reversing: Secrets of Reverse Engineering
  • The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
  • The Shellcoder's Handbook: Discovering and Exploiting Security Holes
  • Gray Hat Python: Python Programming for Hackers and Reverse Engineers
  • The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
  • Bitcoin for the Befuddled
  • Android Hacker's Handbook
  • SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys
  • Rootkits: Subverting the Windows Kernel
  • Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
  • The Practice of Network Security Monitoring: Understanding Incident Detection and Response
  • The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »

Share This Book