Skip to Main Content
Fuzzing: Brute Force Vulnerability Discovery
book

Fuzzing: Brute Force Vulnerability Discovery

by Michael Sutton, Adam Greene, Pedram Amini
June 2007
Intermediate to advanced content levelIntermediate to advanced
576 pages
14h 20m
English
Addison-Wesley Professional
Content preview from Fuzzing: Brute Force Vulnerability Discovery

3. Fuzzing Methods and Fuzzer Types

“Too many good docs are getting out of the business. Too many OB/GYNs aren’t able to practice their love with women all across this country.”

George W. Bush, Poplar Bluff, Mo., September 6, 2004

Fuzzing defines an overall approach to vulnerability discovery. However, under the umbrella of fuzzing you will find various individual methods for how to implement the methodology. In this chapter we begin to dissect fuzzing by looking at these unique methods. We also look at different types of fuzzing that employ these methods and are leveraged against specific classes of targets. Part II of the book is dedicated to dissecting each of these fuzzer types in much greater detail.

Fuzzing Methods

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Sanjib Sinha
Kubernetes Security

Kubernetes Security

Liz Rice, Michael Hausenblas

Publisher Resources

ISBN: 9780321446114Purchase book