Skip to Content
Fuzzing: Brute Force Vulnerability Discovery
book

Fuzzing: Brute Force Vulnerability Discovery

by Michael Sutton, Adam Greene, Pedram Amini
June 2007
Intermediate to advanced content levelIntermediate to advanced
576 pages
14h 20m
English
Addison-Wesley Professional
Content preview from Fuzzing: Brute Force Vulnerability Discovery

Index

A

abort signals, 100

Accept header, 122

Accept-Encoding header, 122

Accept-Language header, 122

access

control, 29

violation handler, 340–342

ActiveX controls, 284

Adobe Acrobat PDF control, 294–296

fuzzer development, 287–289

heuristics, 298

loadable controls, enumerating, 289–293

monitoring, 299

properties, methods, parameters, and types, 293–297

test cases, 298

history, 25

overview, 285–287

vulnerabilities, 273–275

WinZip FileView, 298

adbg, 370

address bar spoofing vulnerabilities, 281

addresses

reading, 476–478

writing to, 478–479

Adobe

Acrobat

PDF control, 294–296

shell script workaround, 192

Macromedia Shockwave Flash file format. See SWF

agents

fault detection, 233

network monitor, 402

process monitor, 403

Sulley sessions, 402–404 ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

SELinux by Example: Using Security Enhanced Linux

SELinux by Example: Using Security Enhanced Linux

Frank Mayer, Karl MacMillan, David Caplan
Open Source Fuzzing Tools

Open Source Fuzzing Tools

Noam Rathaus, Gadi Evron

Publisher Resources

ISBN: 9780321446114Purchase book