Skip to Main Content
Fuzzing: Brute Force Vulnerability Discovery
book

Fuzzing: Brute Force Vulnerability Discovery

by Michael Sutton, Adam Greene, Pedram Amini
June 2007
Intermediate to advanced content levelIntermediate to advanced
576 pages
14h 20m
English
Addison-Wesley Professional
Content preview from Fuzzing: Brute Force Vulnerability Discovery

7. Environment Variable and Argument Fuzzing

“This foreign policy stuff is a little frustrating.”

George W. Bush, as quoted by the New York Daily News, April 23, 2002

Local fuzzing is arguably the simplest type of fuzzing. Although many attackers and researchers will have more impressive results exploiting remote and client-side vulnerabilities, local privilege escalation is still an important topic. Even when a remote attack is leveraged to gain access to a targeted machine, local attacks are often used as a secondary attack vector to obtain required privileges.

Introduction to Local Fuzzing

A user can introduce variables into a program in two main ways. Other than the obvious standard input device, which is usually the ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Sanjib Sinha
Kubernetes Security

Kubernetes Security

Liz Rice, Michael Hausenblas

Publisher Resources

ISBN: 9780321446114Purchase book