About the For Pentesters / Bounty Hunters category

How to find vulnerabilities in third-party binaries

Robert,

We have a blog post that may be of interest regarding finding vulnerabilities in third-party binaries. One of our software architects who is a vulnerabilitiy researcher found a vulnerability in a third-party library used by the National Geospatial Intelligence Agency (NGA), which has since been fixed. In this blog post, we describe how to find vulnerabilities using Mayhem.

Jim
Federal Solutions Architect
ForAllSecure