Skip to Main Content
Fuzzing: Brute Force Vulnerability Discovery
book

Fuzzing: Brute Force Vulnerability Discovery

by Michael Sutton, Adam Greene, Pedram Amini
June 2007
Intermediate to advanced content levelIntermediate to advanced
576 pages
14h 20m
English
Addison-Wesley Professional
Content preview from Fuzzing: Brute Force Vulnerability Discovery

2. What Is Fuzzing?

“They misunderestimated me.”

George W. Bush, Bentonville, Ark., November 6, 2000

The term fuzzing does not exist in mainstream vocabulary, has many aliases, and might be entirely new to some readers. Fuzzing is a broad field and an exciting approach toward software security analysis. Throughout this book we dive into the specifics of various fuzzing aspects and targets. Before doing so, we begin in this chapter with a definition for the term, explore the history of fuzzing, examine the individual phases of a complete fuzzing audit, and conclude with the limitations of fuzz testing.

Definition of Fuzzing

Look up fuzzing in your dictionary and you’re not likely to find anything that will help you to define ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Sanjib Sinha
Kubernetes Security

Kubernetes Security

Liz Rice, Michael Hausenblas

Publisher Resources

ISBN: 9780321446114Purchase book