22. Automated Protocol Dissection
“I know how hard it is for you to put food on your family.”
—George W. Bush, Greater Nashua, NH, January 27, 2000
Previous chapters took a close look at a wide range of fuzzers. From simple byte-mutating generic file fuzzers to the most currently evolved fuzzing frameworks, fuzzing technologies overcome a number of automated software testing hurdles. In this chapter, we introduce the most advanced forms of fuzzing and the attempts to solve a dilemma common among all fuzzing technologies. Specifically, we tackle the indomitable
task of breaking down a protocol into its basic building blocks.
The chapter begins with a discussion of primitive techniques targeted at automating protocol dissection and ...
Get Fuzzing: Brute Force Vulnerability Discovery now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.