vuln: auditing source code
most common vulnerabilities:
- memory corruption: same data copied into memmory parts not assigned for it. often comes with these functions:
- strcat, strcpy, sprintf, gets,...
- data type bugs: types interchanged
- e.g., library function expects short and one overhands int
- metachar injection: when getting input and executed
- use metachar of the specified language and even underlying lib
- sql injection: try to trick the input field to give back data that wasnt planned
- tips:
- check size calculations
- dynamic memory alloc (malloc,..)
- pointer arithmetic