Skip to Main Content
Fuzzing: Brute Force Vulnerability Discovery
book

Fuzzing: Brute Force Vulnerability Discovery

by Michael Sutton, Adam Greene, Pedram Amini
June 2007
Intermediate to advanced content levelIntermediate to advanced
576 pages
14h 20m
English
Addison-Wesley Professional
Content preview from Fuzzing: Brute Force Vulnerability Discovery

6. Automation and Data Generation

“Our enemies are innovative and resourceful, and so are we. They never stop thinking about new ways to harm our country and our people, and neither do we.”

George W. Bush, Washington, DC, August 5, 2004

Fuzzing is all about automation. The key benefit of fuzzing over alternative software testing methodologies is the high ratio of automation to manual labor. Generating individual test cases is laborious and tedious work, a category of tasks ideally suited for a computer. The core competency of a fuzzer is its ability to generate useful data, preferably with minimal human interaction. This chapter focuses on various aspects of automation including language choice, helpful building blocks, and the ever ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Sanjib Sinha
Kubernetes Security

Kubernetes Security

Liz Rice, Michael Hausenblas

Publisher Resources

ISBN: 9780321446114Purchase book