Skip to Main Content
Fuzzing: Brute Force Vulnerability Discovery
book

Fuzzing: Brute Force Vulnerability Discovery

by Michael Sutton, Adam Greene, Pedram Amini
June 2007
Intermediate to advanced content levelIntermediate to advanced
576 pages
14h 20m
English
Addison-Wesley Professional
Content preview from Fuzzing: Brute Force Vulnerability Discovery

24. Intelligent Fault Detection

“Never again in the halls of Washington, DC, do I want to have to make explanations that I can’t explain.”

George W. Bush, Portland, OR, October 31, 2000

We know how to choose a target. We know how to generate data. Thanks to the previous chapter, we know how to track where and how our data is processed. The next important concept to master is deciding when our fuzzer has successfully caused some trouble. This may not always be self evident as the result of a fault might not be easily detected external to the target system. Once again, this topic has not received great attention among today’s currently available fuzzers. Unlike fuzzer tracking, however, we are starting to see strides in both the commercial ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Sanjib Sinha
Kubernetes Security

Kubernetes Security

Liz Rice, Michael Hausenblas

Publisher Resources

ISBN: 9780321446114Purchase book