Skip to Main Content
Fuzzing: Brute Force Vulnerability Discovery
book

Fuzzing: Brute Force Vulnerability Discovery

by Michael Sutton, Adam Greene, Pedram Amini
June 2007
Intermediate to advanced content levelIntermediate to advanced
576 pages
14h 20m
English
Addison-Wesley Professional
Content preview from Fuzzing: Brute Force Vulnerability Discovery

16. Network Protocol Fuzzing:Automation on Windows

“I couldn’t imagine somebody like Osama bin Laden understanding the joy of Hanukkah.”

George W. Bush, White House Menorah lighting ceremony, Washington, DC, December 10, 2001

Although UNIX systems might dominate in the server room, there are more installations of the Microsoft Windows operating system worldwide, which make it an equally coveted attack target. Vulnerabilities affecting the Windows desktop are frequently leveraged in the creation of the many bot nets in existence today. Consider the Slammer worm,[1] which exploits a buffer overflow in Microsoft SQL Server, as a demonstration of the power of a network enabled Windows vulnerability. The vulnerability was addressed in ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Sanjib Sinha
Kubernetes Security

Kubernetes Security

Liz Rice, Michael Hausenblas

Publisher Resources

ISBN: 9780321446114Purchase book