Fuzzing and Vulnerabilities Search
Fuzzing for vulnerabilities can be very effective if we know the input data format. This work contains description of network message format recovery algorithm and the usage of restored data model in fuzzing and vulnerabilities search.
Gespeichert in:
Veröffentlicht in: | Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ 2013-02, Vol.20 (1), p.105-106 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Fuzzing for vulnerabilities can be very effective if we know the input data format. This work contains description of network message format recovery algorithm and the usage of restored data model in fuzzing and vulnerabilities search. |
---|---|
ISSN: | 2074-7128 2074-7136 |