Finding Vulnerabilities – This paper explains the auditing of C source code to find application exploits. Includes a practical example of how to hack an IDS that was coded for a website.
You can download it from the following link: https://packetstormsecurity.com/files/download/29660/FV.txt
Source: https://packetstormsecurity.com/files/29660/FV.txt.html

