24. Intelligent Fault Detection
“Never again in the halls of Washington, DC, do I want to have to make explanations that I can’t explain.”
—George W. Bush, Portland, OR, October 31, 2000
We know how to choose a target. We know how to generate data. Thanks to the previous chapter, we know how to track where and how our data is processed. The next important concept to master is deciding when our fuzzer has successfully caused some trouble. This may not always be self evident as the result of a fault might not be easily detected external to the target system. Once again, this topic has not received great attention among today’s currently available fuzzers. Unlike fuzzer tracking, however, we are starting to see strides in both the commercial ...
Get Fuzzing: Brute Force Vulnerability Discovery now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.