Skip to content

Commit

Permalink
fixin broken links
Browse files Browse the repository at this point in the history
  • Loading branch information
computerality committed May 20, 2014
1 parent 12c10ef commit 24df402
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions vulnerabilities/source.md
Original file line number Diff line number Diff line change
Expand Up @@ -34,8 +34,8 @@ When auditing, it is help to use a tool design to profile and navigate the codeb

Make sure you’re intimately familiar with the internals of the languages you target for analysis. Vulnerabilities are found by auditors who are more familiar with the language and the codebase than the programmers that originally developed it. In some cases, this level of understanding can be achieved simply by paying attaching to optional compiler warnings or through the use of third-party analysis tools that help track down common programming errors. Computer security is tantamount to computer mastery. Without a rigorous understanding of your targets you can never hope to defeat them.

* [Essential C](/vulnerabilities/references/EssentialC.pdf) - Programming in C primer
* [TAOSSA Chapter 6: C Language Issues](/vulnerabilities/references/Dowd_ch06.pdf) - Strongly recommended reading
* [Essential C](/ctf/vulnerabilities/references/EssentialC.pdf) - Programming in C primer
* [TAOSSA Chapter 6: C Language Issues](/ctf/vulnerabilities/references/Dowd_ch06.pdf) - Strongly recommended reading
* [Integer Overflow](http://en.wikipedia.org/wiki/Integer_overflow)
* [Wireshark Security](https://wireshark.org/security/) - Examples of lots of vulnerablities
* [Gera's Insecure Programming by Example](http://community.coresecurity.com/~gera/InsecureProgramming/) - Examples of small vulnerable C programs

0 comments on commit 24df402

Please sign in to comment.