Fuzzing by proxy – generating legitimate traffic

The idea is simple: Taof is functioning as an ordinary proxy server now, handling our traffic to and from the remote service on our behalf. This is so Taof can learn what expected traffic looks like before the mutation fuzzing phase. Now, we simply connect to the proxy with any FTP client—this includes Internet Explorer, by the way. Just specify ftp as the protocol when you punch in the address. In our example, typing ftp://127.0.0.1:1066 into IE allowed me to access the FTP server listening at 192.168.63.130 on port 21.

In today's age, working with insecure protocols in a Windows lab can be frustrating if you have Windows Firewall running in a default configuration. You may need to disable ...

Get Hands-On Penetration Testing on Windows now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.