Here’s an interesting piece from 1998/1999 on how to find security holes.

If a program has a bug in it that manifests under extreme circumstances, then normally, it’s a minor annoyance. Usually, you can just avoid the extreme circumstances, and the bug isn’t a problem. You could duplicate the effect of tickling the bug by writing your own program, if you wanted to.

Very interesting to look back in the dust of time, well, internet time.

Article Link

[tags]Security Holes, Exploits, Vulnerabilities[/tags]

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.