mirror of
https://github.com/autistic-symposium/sec-pentesting-toolkit.git
synced 2025-05-02 06:46:07 -04:00
memory exploits
This commit is contained in:
parent
37268762e1
commit
943728662f
2 changed files with 181 additions and 6 deletions
|
@ -1,4 +1,17 @@
|
|||
# Threat Modeling (Design Review)
|
||||
## Auditing Code
|
||||
|
||||
* Initial value assigments (failure to asign initial values can lead to vulnerabilities).
|
||||
|
||||
* Memory corruption (see Memory_Exploits folder).
|
||||
|
||||
* Static analysis tools:
|
||||
- commercial: Fortify, Klockwork, Coverity
|
||||
- free: LLVM Clang Static Analyzer, FindBugs (Java), RATS
|
||||
|
||||
|
||||
----
|
||||
|
||||
## Threat Modeling (Design Review)
|
||||
|
||||
1. Information Collection:
|
||||
* Assets
|
||||
|
@ -37,3 +50,4 @@
|
|||
* Checked build: an binary with no source code but with debugging information.
|
||||
* Source black box: black box and fuzz testing (example: web applications). Example: auditing a web server with entry point at TCP port 80, you use a HTTP protocol fuzzer.
|
||||
|
||||
----
|
Loading…
Add table
Add a link
Reference in a new issue